Sciweavers

367 search results - page 65 / 74
» The Return of the Sensitivity Attack
Sort
View
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
14 years 9 months ago
Clean Answers over Dirty Databases: A Probabilistic Approach
The detection of duplicate tuples, corresponding to the same real-world entity, is an important task in data integration and cleaning. While many techniques exist to identify such...
Ariel Fuxman, Periklis Andritsos, Renée J. ...
CHI
2007
ACM
14 years 8 months ago
A cognitive constraint model of dual-task trade-offs in a highly dynamic driving task
The paper describes an approach to modeling the strategic variations in performing secondary tasks while driving. In contrast to previous efforts that are based on simulation of a...
Duncan P. Brumby, Andrew Howes, Dario D. Salvucci
EUROGRAPHICS
2010
Eurographics
14 years 4 months ago
Mesh Decomposition with Cross-Boundary Brushes
We present a new intuitive UI, which we call cross-boundary brushes, for interactive mesh decomposition. The user roughly draws one or more strokes across a desired cut and our sy...
Youyi Zheng and Chiew-Lan Tai
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
14 years 1 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg
NSPW
2006
ACM
14 years 1 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti