Sciweavers

16606 search results - page 3199 / 3322
» Context Modeling: Task Model and Practice Model
Sort
View
127
Voted
CHI
2010
ACM
15 years 10 months ago
LayerPaint: a multi-layer interactive 3D painting interface
Painting on 3D surfaces is an important operation in computer graphics, virtual reality, and computer aided design. The painting styles in existing WYSIWYG systems can be awkward,...
Chi-Wing Fu, Jiazhi Xia, Ying He 0001
118
Voted
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 10 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
143
Voted
EDBT
2009
ACM
132views Database» more  EDBT 2009»
15 years 10 months ago
A novel approach for efficient supergraph query processing on graph databases
In recent years, large amount of data modeled by graphs, namely graph data, have been collected in various domains. Efficiently processing queries on graph databases has attracted...
Shuo Zhang, Jianzhong Li, Hong Gao, Zhaonian Zou
157
Voted
ICAC
2009
IEEE
15 years 10 months ago
Ranking the importance of alerts for problem determination in large computer systems
The complexity of large computer systems has raised unprecedented challenges for system management. In practice, operators often collect large volume of monitoring data from system...
Guofei Jiang, Haifeng Chen, Kenji Yoshihira, Akhil...
144
Voted
ICASSP
2009
IEEE
15 years 10 months ago
Beacon-assisted spectrum access with cooperative cognitive transmitter and receiver
—Spectrum access is an important function of cognitive radios for detecting and utilizing spectrum holes without harming the legacy systems. In this paper, we propose novel coope...
Ali Tajer, Xiaodong Wang
« Prev « First page 3199 / 3322 Last » Next »