Sciweavers

8177 search results - page 1501 / 1636
» Detecting System Emulators
Sort
View
127
Voted
IWC
2010
86views more  IWC 2010»
15 years 2 months ago
Enhancing privacy management support in instant messaging
Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. Inadequate support for...
Sameer Patil, Alfred Kobsa
137
Voted
JEI
2010
171views more  JEI 2010»
15 years 1 months ago
Most apparent distortion: full-reference image quality assessment and the role of strategy
The mainstream approach to image quality assessment has centered around accurately modeling the single most relevant strategy employed by the human visual system (HVS) when judging...
Eric C. Larson, Damon M. Chandler
218
Voted
JUCS
2010
162views more  JUCS 2010»
15 years 1 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
138
Voted
MM
2010
ACM
215views Multimedia» more  MM 2010»
15 years 1 months ago
Eyes do not lie: spontaneous versus posed smiles
Automatic detection of spontaneous versus posed facial expressions received a lot of attention in recent years. However, almost all published work in this area use complex facial ...
Hamdi Dibeklioglu, Roberto Valenti, Albert Ali Sal...
128
Voted
PERCOM
2010
ACM
15 years 1 months ago
Analysis of Quality of Surveillance in fusion-based sensor networks
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...
Rui Tan, Guoliang Xing, Xunteng Xu, Jianping Wang
« Prev « First page 1501 / 1636 Last » Next »