Sciweavers

304 search results - page 54 / 61
» Trusted Computing in Mobile Action
Sort
View
CVPR
2007
IEEE
14 years 9 months ago
Active Visual Object Reconstruction using D-, E-, and T-Optimal Next Best Views
In visual 3-D reconstruction tasks with mobile cameras, one wishes to move the cameras so that they provide the views that lead to the best reconstruction result. When the camera ...
Stefan Wenhardt, Benjamin Deutsch, Elli Angelopoul...
PDIS
1994
IEEE
13 years 11 months ago
Session Guarantees for Weakly Consistent Replicated Data
Four per-session guarantees are proposed to aid users and applications of weakly consistent replicated data: Read Your Writes, Monotonic Reads, Writes Follow Reads, and Monotonic ...
Douglas B. Terry, Alan J. Demers, Karin Petersen, ...
ACSAC
2007
IEEE
14 years 2 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
14 years 17 days ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
OZCHI
2009
ACM
14 years 2 months ago
A study of email and SMS use in rural Indonesia
This paper describes a two-year research study that piloted and evaluated the use of low-cost, low-bandwidth Information and Communications Technology (ICT) to support meetings be...
Dean M. G. Hargreaves, Toni Robertson