Sciweavers

46931 search results - page 9373 / 9387
» Networking the networks
Sort
View
INFOCOM
2012
IEEE
13 years 13 days ago
L2P2: Location-aware location privacy protection for location-based services
Abstract—Location privacy has been a serious concern for mobile users who use location-based services provided by the thirdparty provider via mobile networks. Recently, there hav...
Yu Wang 0003, Dingbang Xu, Xiao He, Chao Zhang, Fa...
TOG
2012
187views Communications» more  TOG 2012»
13 years 13 days ago
CrossShade: shading concept sketches using cross-section curves
We facilitate the creation of 3D-looking shaded production drawings from concept sketches. The key to our approach is a class of commonly used construction curves known as cross-s...
Cloud Shao, Adrien Bousseau, Alla Sheffer, Karan S...
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 13 days ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
ISSTA
2012
ACM
13 years 13 days ago
Finding errors in multithreaded GUI applications
To keep a Graphical User Interface (GUI) responsive and active, a GUI application often has a main UI thread (or event dispatching thread) and spawns separate threads to handle le...
Sai Zhang, Hao Lü, Michael D. Ernst
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
13 years 13 days ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su
« Prev « First page 9373 / 9387 Last » Next »