Sciweavers

96 search results - page 5 / 20
» Revealing Additional Information in Two-Party Computations
Sort
View
GROUP
2010
ACM
13 years 5 months ago
The human factors of consistency maintenance in multiplayer computer games
Consistency maintenance (CM) techniques are a crucial part of many distributed systems, and are particularly important in networked games. In this paper we describe a framework of...
Cheryl Savery, T. C. Nicholas Graham, Carl Gutwin
ISBI
2004
IEEE
14 years 8 months ago
Multiple-Image Computed Tomography
We have recently proposed and investigated a planar imaging method called multiple-image radiography (MIR) that concurrently produces three two-dimensional images that reveal info...
Miles N. Wernick, Jovan G. Brankov, Dean Chapman, ...
MKWI
2008
156views Business» more  MKWI 2008»
13 years 9 months ago
Enabling Open Innovation in a World of Ubiquitous Computing - Proposing a Research Agenda
: This article proposes a new Ubiquitous Computing (UC) infrastructure for open access to object data that will come along with a new research agenda especially for the field of Wi...
Detlef Schoder, Christian Schmitt, Kai Fischbach, ...
CCS
2010
ACM
13 years 7 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
SIGIR
2012
ACM
11 years 10 months ago
Improving searcher models using mouse cursor activity
Web search components such as ranking and query suggestions analyze the user data provided in query and click logs. While this data is easy to collect and provides information abo...
Jeff Huang, Ryen W. White, Georg Buscher, Kuansan ...