Sciweavers

5864 search results - page 113 / 1173
» Can We Work around Numerical Methods
Sort
View
CHI
2009
ACM
16 years 4 months ago
On being supple: in search of rigor without rigidity in meeting new design and evaluation challenges for HCI practitioners
In this paper, we argue that HCI practitioners are facing new challenges in design and evaluation that can benefit from the establishment of commonly valued use qualities, with as...
Katherine Isbister, Kristina Höök
AICT
2009
IEEE
130views Communications» more  AICT 2009»
15 years 9 months ago
Modelling an Isolated Compound TCP Connection
—Compound TCP (CTCP) was designed by Tan at al. to improve the efficiency of TCP on high speed networks without unfairly penalizing other connections. In this work we analyze an...
Alberto Blanc, Denis Collange, Konstantin Avrachen...
CVPR
2007
IEEE
16 years 6 months ago
On Constructing Facial Similarity Maps
Automatically determining facial similarity is a difficult and open question in computer vision. The problem is complicated both because it is unclear what facial features humans ...
Alex Holub, Yun-hsueh Liu, Pietro Perona
ICCV
2009
IEEE
15 years 1 months ago
BLOGS: Balanced local and global search for non-degenerate two view epipolar geometry
This work considers the problem of estimating the epipolar geometry between two cameras without needing a prespecified set of correspondences. It is capable of resolving the epipo...
Aveek S. Brahmachari, Sudeep Sarkar
IEEEARES
2008
IEEE
15 years 10 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...