Sciweavers

3544 search results - page 598 / 709
» Information Security in Open Systems
Sort
View
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
13 years 1 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
CORR
2011
Springer
223views Education» more  CORR 2011»
14 years 6 months ago
Decentralized Formation Control Part I: Geometric Aspects
In this paper, we develop new methods for the analysis of decentralized control systems and we apply them to formation control problems. The basic set-up consists of a system with...
Mohamed-Ali Belabbas
PPPJ
2009
ACM
15 years 6 months ago
Tracking performance across software revisions
Repository-based revision control systems such as CVS, RCS, Subversion, and GIT, are extremely useful tools that enable software developers to concurrently modify source code, man...
Nagy Mostafa, Chandra Krintz
MM
2010
ACM
207views Multimedia» more  MM 2010»
14 years 11 months ago
TalkMiner: a search engine for online lecture video
TalkMiner is a search engine for lecture webcasts. Lecture videos are processed to recover a set of distinct slide images and OCR is used to generate a list of indexable terms fro...
John Adcock, Matthew Cooper, Laurent Denoue, Hamed...
COLING
2010
14 years 6 months ago
Cloud Computing for Linguists
The system presented is a web application designed to aid linguistic research with data collection and online publishing. It is a service mainly for linguists and language experts...
Dorothee Beermann, Pavel Mihaylov