Sciweavers

829 search results - page 99 / 166
» Adverse selection in online
Sort
View
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 7 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...
SAMT
2007
Springer
137views Multimedia» more  SAMT 2007»
15 years 7 months ago
Leveraging Ontologies, Context and Social Networks to Automate Photo Annotation
Abstract. This paper presents an approach to semi-automate photo annotation. Instead of using content-recognition techniques this approach leverages context information available a...
Fergal Monaghan, David O'Sullivan
AVSS
2006
IEEE
15 years 7 months ago
An Active Head Tracking System for Distance Education and Videoconferencing Applications
We present a system for automatic head tracking with a single pan-tilt-zoom (PTZ) camera. In distance education the PTZ tracking system developed can be used to follow a teacher a...
Sami Huttunen, Janne Heikkilä
IJCNN
2006
IEEE
15 years 7 months ago
Cooperative Transportation by Multiple Mobile Manipulators using Adaptive NN Control
— It is a challenging task for multiple robots working together to realize object transportation. This paper studies a practical situation that a group of mobile manipulators are...
Xin Chen, Yangmin Li
IPPS
2006
IEEE
15 years 7 months ago
The monitoring request interface (MRI)
In this paper we present MRI, a high level interface for selective monitoring of code regions and data structures in single and multiprocessor environments. MRI keeps transparent ...
Edmond Kereku, Michael Gerndt