Sciweavers

5843 search results - page 207 / 1169
» Software Security in Practice
Sort
View
DMIN
2009
180views Data Mining» more  DMIN 2009»
15 years 2 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
154
Voted
CHI
2011
ACM
14 years 8 months ago
Post-deployment usability: a survey of current practices
Despite the growing research on usability in the predevelopment phase, we know little about post-deployment usability activities. To characterize these activities, we surveyed 333...
Parmit K. Chilana, Andrew J. Ko, Jacob O. Wobbrock...
IEEECGIV
2005
IEEE
15 years 10 months ago
A Practical Implementation of a 3-D Game Engine
Creating a 3-D game engine is not a trivial task as gamers often demand for high quality output with top notch performance in games. In this paper, we show you how various real-ti...
Thomas C. S. Cheah, Kok-Why Ng
JCDL
2005
ACM
111views Education» more  JCDL 2005»
15 years 10 months ago
Developing practical automatic metadata assignment and evaluation tools for internet resources
This paper describes the development of practical automatic metadata assignment tools to support automatic record creation for virtual libraries, metadata repositories and digital...
Gordon W. Paynter
AFRIGRAPH
2004
ACM
15 years 10 months ago
Designing a VR interaction authoring tool using constructivist practices
This paper describes the process of designing an authoring tool for virtual environments, using constructivist principles. The focus of the tool is on helping novice designers wit...
Cara Winterbottom, Edwin H. Blake