Sciweavers

84 search results - page 16 / 17
» Taking the Copy Out of Copyright
Sort
View
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
11 years 8 months ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
CHI
2009
ACM
14 years 6 months ago
Gaze-based interaction with massively multiplayer on-line games
People with motor impairments can benefit greatly from being able to take part in Massively Multiplayer On-line Games, such as World of Warcraft. We are investigating how to use e...
Howell O. Istance, Stephen Vickers, Aulikki Hyrsky...
CISS
2008
IEEE
14 years 6 days ago
Network distribution capacity and content-pipe gap
Abstract— The growth of video content and diversification of content-sharing methods in the Internet lead to an exciting range of new problems in networking, communications, and...
Mung Chiang
ICIA
2007
13 years 8 months ago
Effectiveness of Mobile Recommender Systems for Tourist Destinations: A User Evaluation
Mobile recommender systems have the potential to substantially enrich tourist experiences. As their handling marks a big challenge for ordinary users, its acceptance can only be e...
Marko Modsching, Ronny Kramer, Klaus ten Hagen, Ul...
SECRYPT
2010
129views Business» more  SECRYPT 2010»
13 years 3 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...