Sciweavers

675 search results - page 74 / 135
» What Is New in Our City
Sort
View
85
Voted
TABLETOP
2007
IEEE
15 years 7 months ago
Going Deeper: a Taxonomy of 3D on the Tabletop
Extending the tabletop to the third dimension has the potential to improve the quality of applications involving 3D data and tasks. Recognizing this, a number of researchers have ...
Tovi Grossman, Daniel Wigdor
83
Voted
SAC
2006
ACM
15 years 6 months ago
Ubiquitous presence systems
Instant messaging has become a part of our daily live. Instant communication, either with a mobile device or with a computer based application, is an increasingly used form of com...
Matthias Kranz, Paul Holleis, Albrecht Schmidt
96
Voted
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
15 years 6 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
ADAEUROPE
2004
Springer
15 years 6 months ago
PolyORB: A Schizophrenic Middleware to Build Versatile Reliable Distributed Applications
Abstract. The development of real-time distributed applications requires middleware providing both reliability and performance. Middleware must be adaptable to meet application req...
Thomas Vergnaud, Jérôme Hugues, Laure...
94
Voted
AMFG
2003
IEEE
126views Biometrics» more  AMFG 2003»
15 years 6 months ago
Rank Constrained Recognition under Unknown Illuminations
Recognition under illumination variations is a challenging problem. The key is to successfully separate the illumination source from the observed appearance. Once separated, what ...
Shaohua Kevin Zhou, Rama Chellappa