Sciweavers

280 search results - page 37 / 56
» see 2010
Sort
View
98
Voted
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
14 years 10 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
SIGSOFT
2010
ACM
14 years 10 months ago
A trace simplification technique for effective debugging of concurrent programs
Concurrent programs are notoriously difficult to debug. We see two main reasons for this: 1) concurrency bugs are often difficult to reproduce, 2) traces of buggy concurrent execu...
Nicholas Jalbert, Koushik Sen
UIST
2010
ACM
14 years 10 months ago
Combining multiple depth cameras and projectors for interactions on, above and between surfaces
Instrumented with multiple depth cameras and projectors, LightSpace is a small room installation designed to explore a variety of interactions and computational strategies related...
Andrew D. Wilson, Hrvoje Benko
UIST
2010
ACM
14 years 10 months ago
Chronicle: capture, exploration, and playback of document workflow histories
We describe Chronicle, a new system that allows users to explore document workflow histories. Chronicle captures the entire video history of a graphical document, and provides lin...
Tovi Grossman, Justin Matejka, George W. Fitzmauri...
VISAPP
2010
14 years 10 months ago
Inverse Problems in Imaging and Computer Vision - From Regularization Theory to Bayesian Inference
phies are also mentioned and a common mathematical abstraction for all these inverses problems will be presented. By focusing on a simple linear forward model, first a synthetic an...
Ali Mohammad-Djafari