Sciweavers

596 search results - page 119 / 120
» Person De-identification in Videos
Sort
View
ICMI
2010
Springer
172views Biometrics» more  ICMI 2010»
13 years 3 months ago
Modelling and analyzing multimodal dyadic interactions using social networks
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...
Sergio Escalera, Petia Radeva, Jordi Vitrià...
ICSE
2010
IEEE-ACM
13 years 3 months ago
Synthesized essence: what game jams teach about prototyping of new software products
The development of video games comprises engineering teams within various disciplines, e.g., software engineering, game production, and creative arts. Game jams are a promising ap...
Juergen Musil, Angelika Schweda, Dietmar Winkler, ...
ANCS
2009
ACM
13 years 3 months ago
Design and performance analysis of a DRAM-based statistics counter array architecture
The problem of maintaining efficiently a large number (say millions) of statistics counters that need to be updated at very high speeds (e.g. 40 Gb/s) has received considerable re...
Haiquan (Chuck) Zhao, Hao Wang, Bill Lin, Jun (Jim...
CHI
2011
ACM
12 years 9 months ago
Utilizing multimedia capabilities of mobile phones to support teaching in schools in rural panama
Providing good education is one of the major challenges for humanity. In many developing regions in the world improving educational standards is seen as a central building block f...
Elba del Carmen Valderrama Bahamóndez, Chri...
SIGMETRICS
2012
ACM
248views Hardware» more  SIGMETRICS 2012»
11 years 7 months ago
Pricing cloud bandwidth reservations under demand uncertainty
In a public cloud, bandwidth is traditionally priced in a pay-asyou-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a n...
Di Niu, Chen Feng, Baochun Li