Sciweavers

151 search results - page 24 / 31
» his 2009
Sort
View
88
Voted
IFIPTM
2009
109views Management» more  IFIPTM 2009»
14 years 7 months ago
Elimination of Subjectivity from Trust Recommendation
In many distributed applications, a party who wishes to make a transaction requires that it has a certain level of trust in the other party. It is frequently the case that the part...
Omar Hasan, Lionel Brunie, Jean-Marc Pierson, Elis...
ICIP
2009
IEEE
15 years 10 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
CHI
2009
ACM
15 years 10 months ago
Blobby: how to guide a blind person
For the majority of blind people, walking in unknown places is a very difficult, or even impossible, task to perform, when without help. The adoption of the white cane is the main...
Hugo Nicolau, Joaquim A. Jorge, Tiago João ...
SSS
2009
Springer
15 years 4 months ago
Visiting Gafni's Reduction Land: From the BG Simulation to the Extended BG Simulation
: The Borowsky-Gafni (BG) simulation algorithm is a powerful tool that allows a set of t + 1 asynchronous sequential processes to wait-free simulate (i.e., despite the crash of up ...
Damien Imbs, Michel Raynal
VIS
2009
IEEE
158views Visualization» more  VIS 2009»
15 years 10 months ago
A Novel Interface for Interactive Exploration of DTI Fibers
Visual exploration is essential to the visualization and analysis of densely sampled 3D DTI fibers in biological speciments, due to the high geometric, spatial, and anatomical comp...
Wei Chen, Zi’ang Ding, Song Zhang, Anna MacKay...