Sciweavers

2250 search results - page 142 / 450
» Authorizing applications in singularity
Sort
View
IJITN
2010
177views more  IJITN 2010»
14 years 7 months ago
Real-Time Query Processing on Live Videos in Networks of Distributed Cameras
With the proliferation of inexpensive cameras and the availability of high-speed wired and wireless networks, systems of distributed cameras are becoming an enabling technology fo...
Rui Peng, Alexander J. Aved, Kien A. Hua
INTETAIN
2005
Springer
15 years 3 months ago
Multi-user Multi-touch Games on DiamondTouch with the DTFlash Toolkit
Games and other forms of tabletop electronic entertainment are a natural application of the new multi-user multi-touch tabletop technology DiamondTouch [3]. Electronic versions of...
Alan Esenther, Kent Wittenburg
WWW
2007
ACM
15 years 10 months ago
Demographic prediction based on user's browsing behavior
Demographic information plays an important role in personalized web applications. However, it is usually not easy to obtain this kind of personal data such as age and gender. In t...
Jian Hu, Hua-Jun Zeng, Hua Li, Cheng Niu, Zheng Ch...
KDD
2004
ACM
138views Data Mining» more  KDD 2004»
15 years 10 months ago
IDR/QR: an incremental dimension reduction algorithm via QR decomposition
Dimension reduction is a critical data preprocessing step for many database and data mining applications, such as efficient storage and retrieval of high-dimensional data. In the ...
Jieping Ye, Qi Li, Hui Xiong, Haesun Park, Ravi Ja...
EUROSYS
2007
ACM
15 years 7 months ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...