Sciweavers

1170 search results - page 217 / 234
» How Fast Is Too Fast
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 5 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
ECAI
2000
Springer
15 years 5 months ago
Gaining Insights into Web Customers using Web Intelligence
The web is fast maturing into an important marketing medium that provides businesses with the ability to undertake oneto-one marketing and provide personalised services to their cu...
Sarabjot S. Anand, Matthias Baumgarten, Alex G. B&...
SIGGRAPH
1999
ACM
15 years 5 months ago
Environment Matting and Compositing
This paper introduces a new process, environment matting, which captures not just a foreground object and its traditional opacity matte from a real-world scene, but also a descrip...
Douglas E. Zongker, Dawn M. Werner, Brian Curless,...
103
Voted
RTAS
1999
IEEE
15 years 5 months ago
User Level Scheduling of Communicating Real-Time Tasks
Unique challenges are present when one tries to build distributed real-time applications using standard o -the-shelf systems which are in common use but are not necessarily design...
Chia Shen, Oscar González, Krithi Ramamrith...
95
Voted
SIGGRAPH
1997
ACM
15 years 5 months ago
Creating full view panoramic image mosaics and environment maps
This paper presents a novel approach to creating full view panoramic mosaics from image sequences. Unlike current panoramic stitching methods, which usually require pure horizonta...
Richard Szeliski, Heung-Yeung Shum