Sciweavers

7796 search results - page 1331 / 1560
» On Generalized Schur Numbers
Sort
View
74
Voted
SOUPS
2009
ACM
15 years 5 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
UIST
2009
ACM
15 years 5 months ago
Activity analysis enabling real-time video communication on mobile phones for deaf users
We describe our system called MobileASL for real-time video communication on the current U.S. mobile phone network. The goal of MobileASL is to enable Deaf people to communicate w...
Neva Cherniavsky, Jaehong Chon, Jacob O. Wobbrock,...
UIST
2009
ACM
15 years 5 months ago
EverybodyLovesSketch: 3D sketching for a broader audience
We present EverybodyLovesSketch, a gesture-based 3D curve sketching system for rapid ideation and visualization of 3D forms, aimed at a broad audience. We first analyze traditiona...
Seok-Hyung Bae, Ravin Balakrishnan, Karan Singh
88
Voted
ACSC
2008
IEEE
15 years 5 months ago
Privacy preserving set intersection based on bilinear groups
We propose a more efficient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication c...
Yingpeng Sang, Hong Shen
103
Voted
CISS
2008
IEEE
15 years 5 months ago
Peer-to-Peer utility maximization
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...
« Prev « First page 1331 / 1560 Last » Next »