Sciweavers

1176 search results - page 143 / 236
» Exploiting Online Games
Sort
View
MM
2004
ACM
173views Multimedia» more  MM 2004»
15 years 4 months ago
Cortina: a system for large-scale, content-based web image retrieval
Recent advances in processing and networking capabilities of computers have led to an accumulation of immense amounts of multimedia data such as images. One of the largest reposit...
Till Quack, Ullrich Mönich, Lars Thiele, B. S...
AINA
2010
IEEE
15 years 4 months ago
Context-Aware Mobile Services Transactions
— with the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable envir...
Muhammad Younas, Soraya Kouadri Mostéfaoui
SIGGRAPH
1999
ACM
15 years 3 months ago
Deep Compression for Streaming Texture Intensive Animations
This paper presents a streaming technique for synthetic texture intensive 3D animation sequences. There is a short latency time while downloading the animation, until an initial f...
Daniel Cohen-Or, Yair Mann, Shachar Fleishman
SSDBM
1999
IEEE
108views Database» more  SSDBM 1999»
15 years 3 months ago
Supporting Imprecision in Multidimensional Databases Using Granularities
On-Line Analytical Processing (OLAP) technologies are being used widely, but the lack of effective means of handling data imprecision, which occurs when exact values are not known...
Torben Bach Pedersen, Christian S. Jensen, Curtis ...
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 2 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...