Sciweavers

2927 search results - page 89 / 586
» Secure Distributed Human Computation
Sort
View
COLCOM
2008
IEEE
13 years 11 months ago
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers i...
Tuan Phan, Danfeng (Daphne) Yao
SDM
2007
SIAM
190views Data Mining» more  SDM 2007»
13 years 10 months ago
AC-Framework for Privacy-Preserving Collaboration
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. Increasing security concerns have led to a surge in w...
Wei Jiang, Chris Clifton
ESCIENCE
2005
IEEE
14 years 2 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
ICCV
2007
IEEE
14 years 11 months ago
Human Pose Estimation using Motion Exemplars
We present a motion exemplar approach for finding body configuration in monocular videos. A motion correlation technique is employed to measure the motion similarity at various sp...
Alireza Fathi, Greg Mori
EMINDS
2007
90views more  EMINDS 2007»
13 years 9 months ago
Designing A Smart Shopping-aid System Based on Human-Centered Approach
Abstract We introduce our human-centered approach for designing a ubiquitous computing system which aims at providing a better experience for shoppers at a supermarket. We investig...
Hiroshi Tamura, Tamami Sugasaka, Kazuhiro Ueda