Sciweavers

8655 search results - page 1409 / 1731
» Challenges for Trusted Computing
Sort
View
146
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...
127
Voted
IV
2010
IEEE
125views Visualization» more  IV 2010»
15 years 2 months ago
INSPIRE: A New Method of Mapping Information Spaces
Information spaces such the WWW are the most challenging type of space that many people navigate during everyday life. Unlike the real world, there are no effective maps of inform...
Roy A. Ruddle
134
Voted
IVC
2010
143views more  IVC 2010»
15 years 2 months ago
Video-based face model fitting using Adaptive Active Appearance Model
Active Appearance Model (AAM) represents the shape and appearance of an object via two low-dimensional subspaces, one for shape and one for appearance. AAM for facial images is cu...
Xiaoming Liu
116
Voted
IWC
2010
164views more  IWC 2010»
15 years 2 months ago
Human-computer interaction: A stable discipline, a nascent science, and the growth of the long tail
  This paper represents a personal view of the state of HCI as a design discipline and as a  scientific discipline, and how this is changing in the face...
Alan J. Dix
135
Voted
JUCS
2010
145views more  JUCS 2010»
15 years 2 months ago
Block-based Against Segmentation-based Texture Image Retrieval
Abstract: This paper concerns the best approach to the capture of local texture features for use in content-based image retrieval (CBIR) applications. From our previous work, two a...
Mohammad Faizal Ahmad Fauzi, Paul H. Lewis
« Prev « First page 1409 / 1731 Last » Next »