Sciweavers

4850 search results - page 776 / 970
» Approximate Data Structures with Applications
Sort
View
ESORICS
2009
Springer
16 years 5 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
CHI
2009
ACM
16 years 5 months ago
Fly: a tool to author planar presentations
Modern presentation software is still built around interaction metaphors adapted from traditional slide projectors. We provide an analysis of the problems in this application genr...
Leonhard Lichtschlag, Thorsten Karrer, Jan O. Borc...
CHI
2001
ACM
16 years 5 months ago
Visualization components for persistent conversations
An appropriately designed interface to persistent, threaded conversations could reinforce socially beneficial behavior by prominently featuring how frequently and to what degree e...
Marc A. Smith, Andrew T. Fiore
CVPR
2010
IEEE
16 years 10 days ago
Efficient Piecewise Learning for Conditional Random Fields
Conditional Random Field models have proved effective for several low-level computer vision problems. Inference in these models involves solving a combinatorial optimization probl...
Karteek Alahari, Phil Torr
ETRA
2010
ACM
167views Biometrics» more  ETRA 2010»
15 years 11 months ago
Understanding the benefits of gaze enhanced visual search
In certain applications such as radiology and imagery analysis, it is important to minimize errors. In this paper we evaluate a structured inspection method that uses eye tracking...
Pernilla Qvarfordt, Jacob T. Biehl, Gene Golovchin...