Sciweavers

5215 search results - page 1008 / 1043
» A model of normative power
Sort
View
ISMAR
2002
IEEE
15 years 2 months ago
Practical Solutions for Calibration of Optical See-Through Devices
One of the most crucial tasks in a see-through augmented reality (AR) system is to register the virtual objects with the real world through a transparent display. The importance s...
Yakup Genc, Mihran Tuceryan, Nassir Navab
SIGMOD
2010
ACM
598views Database» more  SIGMOD 2010»
15 years 2 months ago
Ricardo: integrating R and Hadoop
Many modern enterprises are collecting data at the most detailed level possible, creating data repositories ranging from terabytes to petabytes in size. The ability to apply sophi...
Sudipto Das, Yannis Sismanis, Kevin S. Beyer, Rain...
EUROCRYPT
2010
Springer
15 years 2 months ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
15 years 2 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
CDC
2009
IEEE
156views Control Systems» more  CDC 2009»
15 years 2 months ago
The nullspace method - a unifying paradigm to fault detection
— The nullspace method is a powerful framework to solve the synthesis problem of fault detection filters in the most general setting. It is also well suited to address the least...
András Varga
« Prev « First page 1008 / 1043 Last » Next »