Sciweavers

1229 search results - page 184 / 246
» Trusted Computing
Sort
View
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
14 years 10 months ago
Randomized Synopses for Query Assurance on Data Streams
The overwhelming flow of information in many data stream applications forces many companies to outsource to a third-party the deployment of a Data Stream Management System (DSMS) f...
Ke Yi, Feifei Li, Marios Hadjieleftheriou, George ...
CN
2007
99views more  CN 2007»
13 years 9 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
ICCV
2001
IEEE
14 years 11 months ago
Do Ambiguous Reconstructions Always Give Ambiguous Images?
In many cases self-calibration is not able to yield a unique solution for the 3D reconstruction of a scene. This is due to the occurrence of critical motion sequences. If this is ...
Marc Pollefeys, Luc J. Van Gool
ICDS
2007
IEEE
14 years 25 days ago
A Practical Synthesis of Dynamic Role Settings in Telecare Services
- Role provisioning is an essential yet complex aspect of the design of virtual organisations. This paper addresses an even more complex scenario, that of role provisioning in tele...
Ying Liu, Jean Bacon
CANDC
1999
ACM
14 years 1 months ago
A framework that supports collective creativity in design using visual images
The goal of our research is to develop computer systems that support designers’ collective creativity; such systems support individual creative aspects in design through the use...
Kumiyo Nakakoji, Yasuhiro Yamamoto, Masao Ohira