Sciweavers

3108 search results - page 100 / 622
» The Elements of Computer Credibility
Sort
View
CISC
2009
Springer
154views Cryptology» more  CISC 2009»
15 years 2 months ago
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
In a selective private function evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database element...
Helger Lipmaa, Bingsheng Zhang
CHI
2011
ACM
14 years 8 months ago
Pinstripe: eyes-free continuous input on interactive clothing
We present Pinstripe, a textile user interface element for eyes-free, continuous value input on smart garments that uses pinching and rolling a piece of cloth between your finger...
Thorsten Karrer, Moritz Wittenhagen, Leonhard Lich...
PODC
2000
ACM
15 years 8 months ago
Efficient generation of all regular non-dominated coteries
A coterie is a family of subsets such that every pair of subsets in it has at least one element in common but neither is a subset of the other. We introduce an operator , which
Kazuhisa Makino, Tiko Kameda
MM
2005
ACM
146views Multimedia» more  MM 2005»
15 years 10 months ago
Unsupervised content discovery in composite audio
Automatically extracting semantic content from audio streams can be helpful in many multimedia applications. Motivated by the known limitations of traditional supervised approache...
Rui Cai, Lie Lu, Alan Hanjalic
UIST
2010
ACM
15 years 2 months ago
Mixture model based label association techniques for web accessibility
An important aspect of making the Web accessible to blind users is ensuring that all important web page elements such as links, clickable buttons, and form fields have explicitly ...
Muhammad Asiful Islam, Yevgen Borodin, I. V. Ramak...