Author image not provided
 Eleanor G Rieffel

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article4.97
Citation Count154
Publication count31
Publication years2000-2017
Available for download15
Average downloads per article1,042.20
Downloads (cumulative)15,633
Downloads (12 Months)736
Downloads (6 Weeks)83
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


32 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 32
Result page: 1 2

Sort by:

1 published by ACM
December 2017 ACM Transactions on Algorithms (TALG): Volume 13 Issue 4, December 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 10,   Downloads (12 Months): 10,   Downloads (Overall): 10

Full text available: PDFPDF
We consider a distributed private data analysis setting, where multiple parties each hold some sensitive data and they wish to run a protocol to learn some aggregate statistics over the distributed dataset, while protecting each user’s privacy. As an initial effort, we consider a distributed summation problem. We first show ...
Keywords: Differential privacy, distributed private data analysis, periodic aggregation, untrusted aggregator

2 published by ACM
November 2017 PMES'17: Proceedings of the Second International Workshop on Post Moores Era Supercomputing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 11,   Downloads (12 Months): 33,   Downloads (Overall): 33

Full text available: PDFPDF
Challenging computational problems arising in the practical world are frequently tackled by heuristic algorithms. Small universal quantum computers will emerge in the next year or two, enabling a substantial broadening of the types of quantum heuristics that can be investigated beyond quantum annealing. The immediate question is: what experiments should ...
Keywords: approximation algorithms, quantum computing, optimization

3
August 2017 IJCAI'17: Proceedings of the 26th International Joint Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 0

We investigate the application of temporal planners to the problem of compiling quantum circuits to emerging quantum hardware. While our approach is general, we focus our initial experiments on Quantum Approximate Optimization Algorithm (QAOA) circuits that have few ordering constraints and thus allow highly parallel plans. We report on experiments ...

4
May 2017 Parallel Computing: Volume 64 Issue C, May 2017
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

NASA Perspective on Quantum Computing. In the last couple of decades, the world has seen several stunning instances of quantum algorithms that provably outperform the best classical algorithms. For most problems, however, it is currently unknown whether quantum algorithms can provide an advantage, and if so by how much, or ...
Keywords: Boltzmann sampling, Quantum annealing, Quantum computing, Fault diagnosis, Machine learning, Combinatorial optimization, Planning and scheduling

5
April 2017 Quantum Information Processing: Volume 16 Issue 4, April 2017
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

Physical constraints make it challenging to implement and control many-body interactions. For this reason, designing quantum information processes with Hamiltonians consisting of only one- and two-local terms is a worthwhile challenge. Enabling error suppression with two-local Hamiltonians is particularly challenging. A no-go theorem of Marvian and Lidar (Phys Rev Lett ...
Keywords: Error suppression, Quantum annealing, Subsystem quantum error-correcting code, Adiabatic quantum computing, Bacon---Shor code, Two-local Hamiltonian, Adiabatic quantum optimization

6
January 2015 Quantum Information Processing: Volume 14 Issue 1, January 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 2

We report on a case study in programming an early quantum annealer to attack optimization problems related to operational planning. While a number of studies have looked at the performance of quantum annealers on problems native to their architecture, and others have examined performance of select problems stemming from an ...
Keywords: Operational planning, Quantum annealing keyword, Quantum computation

7
July 2014 AAAI'14: Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 0

There are two complementary ways to evaluate planning algorithms: performance on benchmark problems derived from real applications and analysis of performance on parametrized families of problems with known properties. Prior to this work, few means of generating parametrized families of hard planning problems were known. We generate hard planning problems ...

8
February 2014 Future Generation Computer Systems: Volume 31, February, 2014
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2

Collaboration technologies must support information sharing between collaborators, but must also take care not to share too much information or share information too widely. Systems that share information without requiring an explicit action by a user to initiate the sharing must be particularly cautious in this respect. Presence systems are ...
Keywords: Awareness, Homomorphic encryption, Access control, Cloud computing, Presence systems, Privacy

9
March 2013 Personal and Ubiquitous Computing: Volume 17 Issue 3, March 2013
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 1,   Downloads (12 Months): 5,   Downloads (Overall): 103

Full text available: PDFPDF
Presence systems are valuable in supporting workplace communication and collaboration. These systems are effective, however, only if they are widely adopted and candidly used. User perceptions of the utility of the information being shared and their comfort in sharing such information strongly impact both adoption and use. This paper describes ...
Keywords: Collaboration, Privacy, Sharing, Presence systems

10 published by ACM
May 2012 CHI '12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 4,   Downloads (12 Months): 26,   Downloads (Overall): 502

Full text available: PDFPDF
Affect influences workplace collaboration and thereby impacts a workplace's productivity. Participants in face-to-face interactions have many cues to each other's affect, but work is increasingly carried out via computer-mediated channels that lack many of these cues. Current presence systems enable users to estimate the availability of other users, but not ...
Keywords: affect computing, myunity, workplace communication, affect, affect awareness, presence

11
April 2011
Bibliometrics:
Citation Count: 7

The combination of two of the twentieth centurys most influential and revolutionary scientific theories, information theory and quantum mechanics, gave rise to a radically new view of computing and information. Quantum information processing explores the implications of using quantum mechanics instead of classical mechanics to model information and its processing. ...

12 published by ACM
March 2011 AH '11: Proceedings of the 2nd Augmented Human International Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 14,   Downloads (Overall): 236

Full text available: PDFPDF
We describe a system that mirrors a public physical space into cyberspace to provide people with augmented awareness of that space. Through views on web pages, portable devices, or on 'Magic Window' displays located in the physical space, remote people may 'look in' to the space, while people within the ...
Keywords: augmented & mixed reality, virtual worlds, sensor networks

13 published by ACM
October 2010 MM '10: Proceedings of the 18th ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 34,   Downloads (Overall): 273

Full text available: PDFPDF
We show several aspects of a complex mixed reality system that we have built and deployed in a real-world factory setting. In our system, virtual worlds, augmented realities, and social and mobile applications are all fed from the same infrastructure. In collaboration with TCHO[1], a chocolate maker in San Francisco, ...
Keywords: data visualization, mixed reality, mobile applications, pervasive computing, simulation, 3d applications, collaborative tools, cross-reality, remote collaboration, virtual worlds

14 published by ACM
September 2010 ACM SIGACT News: Volume 41 Issue 3, September 2010
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 13,   Downloads (Overall): 162

Full text available: PDFPDF

15 published by ACM
October 2009 MM '09: Proceedings of the 17th ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 6,   Downloads (Overall): 86

Full text available: PDFPDF
The Pantheia system enables users to create virtual models by `marking up' the real world with pre-printed markers. The markers have predefined meanings that guide the system as it creates models. Pantheia takes as input user captured images or video of the marked up space. This video illustrates the workings ...
Keywords: image-based modeling, virtual environments

16
June 2009 ICME'09: Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

In this paper, we describe an automatic lighting adjustment method for browsing object images. From a set of images of an object, taken under different lighting conditions, we generate two types of illuminated images: a textural image which eliminates unwanted specular reflections of the object, and a highlight image in ...
Keywords: object image browsing, image-based relighting, image-based rendering, lighting adjustment

17
May 2009 IMMERSCOM '09: Proceedings of the 2nd International Conference on Immersive Telecommunications
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 47

Full text available: PDFPDF
We describe Pantheia, a system that constructs virtual models of real spaces from collections of images, through the use of visual markers that guide and constrain model construction. To create a model users simply 'mark up' the real world scene by placing preprinted markers that describe scene elements or impose ...

18 published by ACM
October 2008 MM '08: Proceedings of the 16th ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 173

Full text available: PDFPDF
This video shows the Virtual Physics Circus, a kind of playground for experimenting with simple physical models. The system makes it easy to create worlds with common physical objects such as swings, vehicles, ramps, and walls, and interactively play with those worlds. The system can be used as a creative ...
Keywords: design, mixed reality, education, virtual reality, art, physics

19
September 2008 SCN '08: Proceedings of the 6th international conference on Security and Cryptography for Networks
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 18

While recent timed-release encryption (TRE) schemes are implicitly supported by a certificateless encryption (CLE) mechanism, the security models of CLE and TRE differ and there is no generic transformation from a CLE to a TRE. This paper gives a generalized model for CLE that fulfills the requirements of TRE. This ...
Keywords: timed-release encryption, Security-mediated certificateless encryption, standard model

20 published by ACM
March 2008 WiSec '08: Proceedings of the first ACM conference on Wireless network security
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 1,   Downloads (12 Months): 47,   Downloads (Overall): 787

Full text available: PDFPDF
Wireless networking is widespread in public places such as cafes. Unsuspecting users may become victims of attacks based on "evil twin" access points. These rogue access points are operated by criminals in an attempt to launch man-in-the-middle attacks. We present a simple protection mechanism against binding to an evil twin. ...
Keywords: device pairing, evil twin, wireless security, usable security



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us