Sciweavers

2316 search results - page 341 / 464
» The many forms of hypercomputation
Sort
View
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
15 years 10 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
AFRIGRAPH
2006
ACM
15 years 10 months ago
A GPU based saliency map for high-fidelity selective rendering
The computation of high-fidelity images in real-time remains one of the key challenges for computer graphics. Recent work has shown that by understanding the human visual system,...
Peter Longhurst, Kurt Debattista, Alan Chalmers
UIST
2006
ACM
15 years 10 months ago
Translating keyword commands into executable code
Modern applications provide interfaces for scripting, but many users do not know how to write script commands. However, many users are familiar with the idea of entering keywords ...
Greg Little, Robert C. Miller
JCDL
2005
ACM
161views Education» more  JCDL 2005»
15 years 10 months ago
Downloading textual hidden web content through keyword queries
An ever-increasing amount of information on the Web today is available only through search interfaces: the users have to type in a set of keywords in a search form in order to acc...
Alexandros Ntoulas, Petros Zerfos, Junghoo Cho
SENSYS
2005
ACM
15 years 10 months ago
Estimating clock uncertainty for efficient duty-cycling in sensor networks
Radio duty cycling has received significant attention in sensor networking literature, particularly in the form of protocols for medium access control and topology management. Whi...
Saurabh Ganeriwal, Deepak Ganesan, Hohyun Shim, Vl...