Sciweavers

8655 search results - page 1419 / 1731
» Challenges for Trusted Computing
Sort
View
136
Voted
EXPERT
2010
145views more  EXPERT 2010»
15 years 27 days ago
Interaction Analysis with a Bayesian Trajectory Model
Human behavior recognition is one of the most important and challenging objectives performed by intelligent vision systems. Several issues must be faced in this domain ranging fro...
Alessio Dore, Carlo S. Regazzoni
129
Voted
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 25 days ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
128
Voted
IJMHCI
2010
126views more  IJMHCI 2010»
15 years 25 days ago
Cocktail: Exploiting Bartenders' Gestures for Mobile Interaction
Recent mobile devices are capable of creating and storing a large amount of multimedia data, but sharing those data with others is still challenging. This paper presents Cocktail,...
Jong-Woon Yoo, Woomin Hwang, Hyunchul Seok, Sung K...
138
Voted
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 8 days ago
Comparing Prediction Market Structures, With an Application to Market Making
Ensuring sufficient liquidity is one of the key challenges for designers of prediction markets. Various market making algorithms have been proposed in the literature and deployed ...
Aseem Brahma, Sanmay Das, Malik Magdon-Ismail
BICA
2010
14 years 10 months ago
Explanatory Aspirations and the Scandal of Cognitive Neuroscience
In this position paper we argue that BICA must simultaneously be compatible with the explanation of human cognition and support the human design of artificial cognitive systems. Mo...
Ross Gayler, Simon D. Levy, Rens Bod
« Prev « First page 1419 / 1731 Last » Next »