Sciweavers

280 search results - page 37 / 56
» see 2010
Sort
View
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
13 years 7 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
SIGSOFT
2010
ACM
13 years 7 months ago
A trace simplification technique for effective debugging of concurrent programs
Concurrent programs are notoriously difficult to debug. We see two main reasons for this: 1) concurrency bugs are often difficult to reproduce, 2) traces of buggy concurrent execu...
Nicholas Jalbert, Koushik Sen
UIST
2010
ACM
13 years 7 months ago
Combining multiple depth cameras and projectors for interactions on, above and between surfaces
Instrumented with multiple depth cameras and projectors, LightSpace is a small room installation designed to explore a variety of interactions and computational strategies related...
Andrew D. Wilson, Hrvoje Benko
UIST
2010
ACM
13 years 7 months ago
Chronicle: capture, exploration, and playback of document workflow histories
We describe Chronicle, a new system that allows users to explore document workflow histories. Chronicle captures the entire video history of a graphical document, and provides lin...
Tovi Grossman, Justin Matejka, George W. Fitzmauri...
VISAPP
2010
13 years 7 months ago
Inverse Problems in Imaging and Computer Vision - From Regularization Theory to Bayesian Inference
phies are also mentioned and a common mathematical abstraction for all these inverses problems will be presented. By focusing on a simple linear forward model, first a synthetic an...
Ali Mohammad-Djafari