Sciweavers

8655 search results - page 1454 / 1731
» Challenges for Trusted Computing
Sort
View
142
Voted
CSCW
2012
ACM
13 years 11 months ago
Blogs as a collective war diary
Disaster-related research in human-centered computing has typically focused on the shorter-term, emergency period of a disaster event, whereas effects of some crises are longterm,...
Gloria Mark, Mossaab Bagdouri, Leysia Palen, James...
153
Voted
KDD
2012
ACM
181views Data Mining» more  KDD 2012»
13 years 5 months ago
On "one of the few" objects
Objects with multiple numeric attributes can be compared within any “subspace” (subset of attributes). In applications such as computational journalism, users are interested i...
You Wu, Pankaj K. Agarwal, Chengkai Li, Jun Yang 0...
179
Voted
ICDCS
2012
IEEE
13 years 5 months ago
Combining Partial Redundancy and Checkpointing for HPC
Today’s largest High Performance Computing (HPC) systems exceed one Petaflops (1015 floating point operations per second) and exascale systems are projected within seven years...
James Elliott, Kishor Kharbas, David Fiala, Frank ...
SIGGRAPH
1990
ACM
15 years 7 months ago
Rapid controlled movement through a virtual 3D workspace
not abstract asymmetry: different sides looks different clumps different from "data objects" need grid structure, alignment [Design Guidelines for Landmarks to Support Na...
Jock D. Mackinlay, Stuart K. Card, George G. Rober...
CVPR
2009
IEEE
16 years 10 months ago
Locally Constrained Diffusion Process on Locally Densified Distance Spaces with Applications to Shape Retrieval
The matching and retrieval of 2D shapes is an important challenge in computer vision. A large number of shape similarity approaches have been developed, with the main focus bein...
Xingwei Yang (Temple University), Suzan Koknar-Tez...
« Prev « First page 1454 / 1731 Last » Next »