Sciweavers

10435 search results - page 1915 / 2087
» Measuring system normality
Sort
View
ICFP
2010
ACM
15 years 4 months ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce
130
Voted
MM
2010
ACM
151views Multimedia» more  MM 2010»
15 years 3 months ago
Enhanced exploration of oral history archives through processed video and synchronized text transcripts
A digital video library of over 900 hours of video and 18000 stories from The HistoryMakers was used by 266 students, faculty, librarians, and life-long learners interacting with ...
Michael G. Christel, Scott M. Stevens, Bryan Maher...
150
Voted
MM
2010
ACM
265views Multimedia» more  MM 2010»
15 years 3 months ago
Affective image classification using features inspired by psychology and art theory
Images can affect people on an emotional level. Since the emotions that arise in the viewer of an image are highly subjective, they are rarely indexed. However there are situation...
Jana Machajdik, Allan Hanbury
154
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
On the forwarding capability of mobile handhelds for video streaming over MANETs
Despite the importance of real-world experiments, nearly all ongoing research activities addressing video streaming over MANETs are based on simulation studies. Earlier research s...
Stein Kristiansen, Morten Lindeberg, Daniel Rodr&i...
131
Voted
ESORICS
2010
Springer
15 years 3 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
« Prev « First page 1915 / 2087 Last » Next »