Sciweavers

24529 search results - page 4764 / 4906
» Computing on Authenticated Data
Sort
View
143
Voted
SIGIR
2009
ACM
15 years 10 months ago
Learning to recommend with social trust ensemble
As an indispensable technique in the field of Information Filtering, Recommender System has been well studied and developed both in academia and in industry recently. However, mo...
Hao Ma, Irwin King, Michael R. Lyu
SOUPS
2009
ACM
15 years 10 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
134
Voted
VRST
2009
ACM
15 years 10 months ago
Gaze behavior and visual attention model when turning in virtual environments
In this paper we analyze and try to predict the gaze behavior of users navigating in virtual environments. We focus on first-person navigation in virtual environments which invol...
Sébastien Hillaire, Anatole Lécuyer,...
WIKIS
2009
ACM
15 years 10 months ago
Measuring the wikisphere
Due to the inherent difficulty in obtaining experimental data from wikis, past quantitative wiki research has largely been focused on Wikipedia, limiting the degree that it can be...
Jeff Stuckman, James Purtilo
151
Voted
IPSN
2010
Springer
15 years 10 months ago
Distributed estimation of linear acceleration for improved accuracy in wireless inertial motion capture
Motion capture using wireless inertial measurement units (IMUs) has many advantages over other techniques. Achieving accurate tracking with IMUs presents a processing challenge, e...
A. D. Young, M. J. Ling, D. K. Arvind
« Prev « First page 4764 / 4906 Last » Next »