Sciweavers

1816 search results - page 210 / 364
» Trace oblivious computation
Sort
View
HUC
2010
Springer
13 years 10 months ago
Exploring end user preferences for location obfuscation, location-based services, and the value of location
Long-term personal GPS data is useful for many UbiComp services such as traffic monitoring and environmental impact assessment. However, inference attacks on such traces can revea...
A. J. Bernheim Brush, John Krumm, James Scott
CGF
2005
126views more  CGF 2005»
13 years 8 months ago
Pen-and-Ink for BlobTree Implicit Models
New techniques are presented for rendering complex hierarchical skeletal implicit models in several pen-and-ink styles. A particle system is employed to find interesting areas on ...
Kevin Foster, Pauline Jepp, Brian Wyvill, Mario Co...
CG
1999
Springer
13 years 8 months ago
A visibility algorithm for hybrid geometry- and image-based modeling and rendering
Hybrid geometry- and image-based modeling and rendering systems use photographs taken of a real-world environment and mapped onto the surfaces of a 3D model to achieve photorealis...
Thomas A. Funkhouser
INFOCOM
2011
IEEE
13 years 20 days ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
GRAPHICSINTERFACE
2011
13 years 13 days ago
Edge-constrained image compositing
The classic task of image compositing is complicated by the fact that the source and target images need to be carefully aligned and adjusted. Otherwise, it is not possible to achi...
Martin Eisemann, Daniel Gohlke, Marcus A. Magnor