Sciweavers

863 search results - page 131 / 173
» Computational Methods for Intelligent Information Access
Sort
View
116
Voted
ICMI
2003
Springer
96views Biometrics» more  ICMI 2003»
15 years 8 months ago
Learning and reasoning about interruption
We present methods for inferring the cost of interrupting users based on multiple streams of events including information generated by interactions with computing devices, visual ...
Eric Horvitz, Johnson Apacible
TOG
2008
236views more  TOG 2008»
15 years 3 months ago
Face swapping: automatically replacing faces in photographs
In this paper, we present a complete system for automatic face replacement in images. Our system uses a large library of face images created automatically by downloading images fr...
Dmitri Bitouk, Neeraj Kumar, Samreen Dhillon, Pete...
132
Voted
WWW
2003
ACM
16 years 4 months ago
Detecting Near-replicas on the Web by Content and Hyperlink Analysis
The presence of replicas or near-replicas of documents is very common on the Web. Documents may be replicated completely or partially for different reasons (versions, mirrors, etc...
Ernesto Di Iorio, Michelangelo Diligenti, Marco Go...
134
Voted
DCC
2009
IEEE
16 years 4 months ago
Optimization of Correlated Source Coding for Event-Based Monitoring in Sensor Networks
Motivated by the paradigm of event-based monitoring, which can potentially alleviate the inherent bandwidth and energy constraints associated with wireless sensor networks, we con...
Jaspreet Singh, Ankur Saxena, Kenneth Rose, Upaman...
CHI
2006
ACM
16 years 4 months ago
Tensions in designing capture technologies for an evidence-based care community
Evidence-based care is an increasingly popular process for long term diagnosis and monitoring of education and healthcare disabilities. Because this evidence must also be collecte...
Gillian R. Hayes, Gregory D. Abowd