Sciweavers

2061 search results - page 323 / 413
» Authorization for Metacomputing Applications
Sort
View
117
Voted
CHI
2005
ACM
16 years 1 months ago
A study on the manipulation of 2D objects in a projector/camera-based augmented reality environment
Are the object manipulation techniques traditionally used in head?mounted displays (HMDs) applicable to augmented reality based projection systems? This paper examines the differe...
Stephen Voida, Mark Podlaseck, Rick Kjeldsen, Clau...
116
Voted
CHI
2005
ACM
16 years 1 months ago
Connecting with kids: so what's new?
From pre-schools to high schools, at home and in museums, the educational community has embraced the use of computers as a teaching tool. Yet many institutions will simply install...
Lori L. Scarlatos, Amy Bruckman, Allison Druin, Mi...
120
Voted
CHI
2004
ACM
16 years 1 months ago
Automatic support for web user studies with SCONE and TEA
This paper describes the concepts of TEA, a flexible tool that supports user tests by automating repetitive tasks and collecting data of user inputs and actions. TEA was specifica...
Hartmut Obendorf, Harald Weinreich, Torsten Hass
STOC
2007
ACM
112views Algorithms» more  STOC 2007»
16 years 28 days ago
Smooth sensitivity and sampling in private data analysis
We introduce a new, generic framework for private data analysis. The goal of private data analysis is to release aggregate information about a data set while protecting the privac...
Kobbi Nissim, Sofya Raskhodnikova, Adam Smith
STOC
2006
ACM
152views Algorithms» more  STOC 2006»
16 years 28 days ago
Private approximation of search problems
Many approximation algorithms have been presented in the last decades for hard search problems. The focus of this paper is on cryptographic applications, where it is desired to de...
Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb