Sciweavers

8655 search results - page 393 / 1731
» Challenges for Trusted Computing
Sort
View
122
Voted
ICCV
2001
IEEE
16 years 5 months ago
Do Ambiguous Reconstructions Always Give Ambiguous Images?
In many cases self-calibration is not able to yield a unique solution for the 3D reconstruction of a scene. This is due to the occurrence of critical motion sequences. If this is ...
Marc Pollefeys, Luc J. Van Gool
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
16 years 5 months ago
Randomized Synopses for Query Assurance on Data Streams
The overwhelming flow of information in many data stream applications forces many companies to outsource to a third-party the deployment of a Data Stream Management System (DSMS) f...
Ke Yi, Feifei Li, Marios Hadjieleftheriou, George ...
128
Voted
CHI
2009
ACM
16 years 4 months ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 4 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
134
Voted
CHI
2006
ACM
16 years 4 months ago
The validity of the stimulated retrospective think-aloud method as measured by eye tracking
Retrospective Think aloud (RTA) is a usability method that collects the verbalization of a user's performance after the performance is over. There has been little work done t...
Zhiwei Guan, Shirley Lee, Elisabeth Cuddihy, Judit...