Sciweavers

1729 search results - page 191 / 346
» Practical Temporal Projection
Sort
View
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
12 years 5 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...
CVPR
2008
IEEE
15 years 7 days ago
Structure learning in random fields for heart motion abnormality detection
Coronary Heart Disease can be diagnosed by assessing the regional motion of the heart walls in ultrasound images of the left ventricle. Even for experts, ultrasound images are dif...
Glenn Fung, Kevin Murphy, Mark Schmidt, Róm...
SIGSOFT
2005
ACM
14 years 11 months ago
A case study on value-based requirements tracing
Project managers aim at keeping track of interdependencies between various artifacts of the software development lifecycle, to find out potential requirements conflicts, to better...
Matthias Heindl, Stefan Biffl
CHI
2007
ACM
14 years 10 months ago
Using activity theory to develop a design framework for rural development
Many attempts to bridge the digital divide between lesser-developed countries (LDC) through Information & Communication Technology (ICT) projects have had little success. With...
Arvind Ashok, Christian Beck
CHI
2004
ACM
14 years 10 months ago
Putting the users center stage: role playing and low-fi prototyping enable end users to design mobile systems
This paper sums up lessons learned from a sequence of cooperative design workshops where end users were enabled to design mobile systems through scenario building, role playing, a...
Dag Svanaes, Gry Seland