Sciweavers

8655 search results - page 297 / 1731
» Challenges for Trusted Computing
Sort
View
150
Voted
EGOV
2011
Springer
14 years 3 months ago
On the Relevance of Enterprise Architecture and IT Governance for Digital Preservation
Digital Preservation has been recognized as a key challenge in providing trusted information and sustainable eGovernment services. However, there has been little convergence on ali...
Christoph Becker, José Barateiro, Gon&ccedi...
182
Voted
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 5 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
100
Voted
ACL
2010
15 years 1 months ago
Cognitively Plausible Models of Human Language Processing
We pose the development of cognitively plausible models of human language processing as a challenge for computational linguistics. Existing models can only deal with isolated phen...
Frank Keller
109
Voted
CVPR
2006
IEEE
16 years 5 months ago
Successive Convex Matching for Action Detection
We propose human action detection based on a successive convex matching scheme. Human actions are represented as sequences of postures and specific actions are detected in video b...
Hao Jiang, Mark S. Drew, Ze-Nian Li
90
Voted
CHI
2007
ACM
16 years 3 months ago
Similarity is more important than expertise: accent effects in speech interfaces
In a balanced between-participants experiment (N = 96) American and Swedish participants listened to tourist information on a website about an American or Swedish city presented i...
Clifford Nass, Jenny Alwin, Nils Dahlbäck, Qi...