Sciweavers

6039 search results - page 1154 / 1208
» The Function Space of an Activity
Sort
View
116
Voted
SIGCOMM
2012
ACM
13 years 3 months ago
LIFEGUARD: practical repair of persistent route failures
The Internet was designed to always find a route if there is a policycompliant path. However, in many cases, connectivity is disrupted despite the existence of an underlying vali...
Ethan Katz-Bassett, Colin Scott, David R. Choffnes...
116
Voted
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
125
Voted
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 3 months ago
Factoring past exposure in display advertising targeting
Online advertising is increasingly becoming more performance oriented, where the decision to show an advertisement to a user is made based on the user’s propensity to respond to...
Neha Gupta, Abhimanyu Das, Sandeep Pandey, Vijay K...
CADUI
2006
15 years 2 months ago
GestAction3D: A Platform For Studying Displacements And Deformations Of 3D Objects Using Hands
We present a low-cost hand-based device coupled with a 3D motion recovery engine and 3D visualization. This platform aims at studying ergonomic 3D interactions in order to manipula...
Diane Lingrand, Philippe Renevier, Anne-Marie Pinn...
ICDE
2006
IEEE
183views Database» more  ICDE 2006»
15 years 6 months ago
Similarity Queries on Structured Data in Structured Overlays
Structured P2P systems based on distributed hash tables are a popular choice for building large-scaled data management systems. Generally, they only support exact match queries, b...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
« Prev « First page 1154 / 1208 Last » Next »