Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Kirill A. Shatilov"'
Publikováno v:
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 3:1-19
Although many children are born with congenital limb malformation, contemporary functional artificial hands are costly and are not meant to be adapted to growing hand. In this work, we develop a low cost, adaptable and personalizable system of an art
Incremental and quantitative improvements of two-way interactions with e x tended realities (XR) are contributing toward a qualitative leap into a state of XR ecosystems being efficient, user-friendly, and widely adopted. However, there are multiple
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5a96d4778d1a9b7dc32e15e7c584e2b1
http://hdl.handle.net/10138/339930
http://hdl.handle.net/10138/339930
Autor:
Young D. Kwon, Serkan Kumyol, Yui-Pan Yau, Pan Hui, Kit-Yung Lam, Kirill A. Shatilov, Lik Hang Lee
Publikováno v:
PerCom Workshops
The seamless textual input in Augmented Reality (AR) is very challenging and essential for enabling user-friendly AR applications. Existing approaches such as speech input and vision-based gesture recognition suffer from environmental obstacles and t
Publikováno v:
Proceedings of the 11th Central & Eastern European Software Engineering Conference in Russia.
Outsourcing data and IT infrastructure can be profitable for business, but it raises severe privacy issues. Ordinary encryptions partially solve the problem, but they limits operations, which can be performed over encrypted data. In this paper, we pr
Publikováno v:
FedCSIS (Position Papers)
Security of outsourced data is crucial for businesses. To protect and secure outsourced database, as a part of dynamic web resource while maintaining site's work, we propose a solution featuring following key ideas. Firstly, we suggest to encrypt dat
Publikováno v:
FedCSIS (Position Papers)
Outsourced computations and, more particularly, cloud computations, are widespread nowadays. That is why the problem of keeping the data security arises. Multiple fully homomorphic cryptosystems were proposed in order to perform secret computations i
Publikováno v:
FedCSIS
Cloud computing and, more particularly, cloud databases, is a great technology for remote centralized data managing. However, there are some drawbacks including privacy issues, insider threats and potential database thefts. Full encryption of remote