Sciweavers

1242 search results - page 229 / 249
» Digital Objects as Passwords
Sort
View
SENSYS
2004
ACM
15 years 3 months ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler
SIGCOMM
2004
ACM
15 years 3 months ago
A layered naming architecture for the internet
Currently the Internet has only one level of name resolution, DNS, which converts user-level domain names into IP addresses. In this paper we borrow liberally from the literature ...
Hari Balakrishnan, Karthik Lakshminarayanan, Sylvi...
UIST
2004
ACM
15 years 3 months ago
Video-based document tracking: unifying your physical and electronic desktops
This paper presents an approach for tracking paper documents on the desk over time and automatically linking them to the corresponding electronic documents using an overhead video...
Jiwon Kim, Steven M. Seitz, Maneesh Agrawala
VRST
2004
ACM
15 years 3 months ago
A CAVE system for interactive modeling of global illumination in car interior
Global illumination dramatically improves realistic appearance of rendered scenes, but usually it is neglected in VR systems due to its high costs. In this work we present an effi...
Kirill Dmitriev, Thomas Annen, Grzegorz Krawczyk, ...
CIKM
2004
Springer
15 years 3 months ago
Hierarchical document categorization with support vector machines
Automatically categorizing documents into pre-defined topic hierarchies or taxonomies is a crucial step in knowledge and content management. Standard machine learning techniques ...
Lijuan Cai, Thomas Hofmann