Sciweavers

1242 search results - page 169 / 249
» Digital Objects as Passwords
Sort
View
PAMI
2007
219views more  PAMI 2007»
14 years 9 months ago
Shape Estimation Using Polarization and Shading from Two Views
—This paper presents a novel method for 3D surface reconstruction that uses polarization and shading information from two views. The method relies on the polarization data acquir...
Gary Atkinson, Edwin R. Hancock
SCFBM
2008
143views more  SCFBM 2008»
14 years 9 months ago
LSID Tester, a tool for testing Life Science Identifier resolution services
Background: Life Science Identifiers (LSIDs) are persistent, globally unique identifiers for biological objects. The decentralised nature of LSIDs makes them attractive for identi...
Roderic D. M. Page
CIKM
2010
Springer
14 years 8 months ago
Learning to rank relevant and novel documents through user feedback
We consider the problem of learning to rank relevant and novel documents so as to directly maximize a performance metric called Expected Global Utility (EGU), which has several de...
Abhimanyu Lad, Yiming Yang
WCET
2010
14 years 7 months ago
Hybrid measurement-based WCET analysis at the source level using object-level traces
Hybrid measurement-based approaches to worst-case execution time (WCET) analysis combine measured execution times of small program segments using static analysis of the larger sof...
Adam Betts, Nicholas Merriam, Guillem Bernat
CHI
2003
ACM
15 years 10 months ago
Ethnographic interviews guide design of ford vehicles website
This case study describes ethnographic interviews with vehicle buyers to learn how they make purchase decisions. The research was conducted for J. Walter Thompson (JWT), the digit...
Lori Anschuetz, Stephanie Rosenbaum