Sciweavers

427 search results - page 72 / 86
» Policies: Giving Users Control over Calls
Sort
View
IEEEARES
2010
IEEE
14 years 3 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
COST
1994
Springer
159views Multimedia» more  COST 1994»
14 years 1 months ago
A Mail-Based Teleservice Architecture for Archiving and Retrieving Dynamically Composable Multimedia Documents
In this paper, a teleservice for archiving and retrieving multimedia documents using public networks is described. This teleservice encourages a broad range of commercially applic...
Heiko Thimm, Katja Röhr, Thomas C. Rakow
WSCG
2000
97views more  WSCG 2000»
13 years 11 months ago
Human Movement Instruction System that Utilizes Avatar Overlays Using Stereoscopic Images
In the Mixed Reality environment that combines the real world and the virtual world it is important to control the 'place' that comprises both real and virtual objects. ...
Masayuki Ihara, Yoshihiro Shimada, Kenichi Kida, S...
TPDS
2010
103views more  TPDS 2010»
13 years 8 months ago
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
—Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distrib...
Xing Jin, S.-H. Gary Chan, Wan-Ching Wong, Ali C. ...
CCS
2005
ACM
14 years 3 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov