Sciweavers

4636 search results - page 736 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
106
Voted
IJNSEC
2006
134views more  IJNSEC 2006»
14 years 11 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
CHI
2009
ACM
15 years 11 months ago
Comparing usage of a large high-resolution display to single or dual desktop displays for daily work
With the ever increasing amount of digital information, users desire more screen real estate to process their daily computing work, and might well benefit from using a wallsize la...
Xiaojun Bi, Ravin Balakrishnan
WADS
2001
Springer
137views Algorithms» more  WADS 2001»
15 years 3 months ago
Visual Ranking of Link Structures
Methods for ranking World Wide Web resources according to their position in the link structure of the Web are receiving considerable attention, because they provide the first e...
Ulrik Brandes, Sabine Cornelsen
NIPS
2004
15 years 15 days ago
Active Learning for Anomaly and Rare-Category Detection
We introduce a novel active-learning scenario in which a user wants to work with a learning algorithm to identify useful anomalies. These are distinguished from the traditional st...
Dan Pelleg, Andrew W. Moore
CVIU
2006
166views more  CVIU 2006»
14 years 11 months ago
Non-parametric and light-field deformable models
Statistical shape-and-texture appearance models use image morphing to define a rich, compact representation of object appearance. They are useful in a variety of applications incl...
Chris Mario Christoudias, Louis-Philippe Morency, ...