Sciweavers

84 search results - page 16 / 17
» Taking the Copy Out of Copyright
Sort
View
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
13 years 1 days ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
69
Voted
CHI
2009
ACM
15 years 10 months ago
Gaze-based interaction with massively multiplayer on-line games
People with motor impairments can benefit greatly from being able to take part in Massively Multiplayer On-line Games, such as World of Warcraft. We are investigating how to use e...
Howell O. Istance, Stephen Vickers, Aulikki Hyrsky...
CISS
2008
IEEE
15 years 4 months ago
Network distribution capacity and content-pipe gap
Abstract— The growth of video content and diversification of content-sharing methods in the Internet lead to an exciting range of new problems in networking, communications, and...
Mung Chiang
ICIA
2007
14 years 12 months ago
Effectiveness of Mobile Recommender Systems for Tourist Destinations: A User Evaluation
Mobile recommender systems have the potential to substantially enrich tourist experiences. As their handling marks a big challenge for ordinary users, its acceptance can only be e...
Marko Modsching, Ronny Kramer, Klaus ten Hagen, Ul...
SECRYPT
2010
129views Business» more  SECRYPT 2010»
14 years 7 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...