Sciweavers

623 search results - page 61 / 125
» Does personality matter
Sort
View
80
Voted
CHI
2007
ACM
16 years 1 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
CHI
2005
ACM
16 years 1 months ago
Time quilt: scaling up zoomable photo browsers for large, unstructured photo collections
In the absence of manual organization of large digital photo collections, the photos' visual content and creation dates can help support time-based visual search tasks. Curre...
David Huynh, Steven M. Drucker, Patrick Baudisch, ...
107
Voted
ICSE
2007
IEEE-ACM
16 years 25 days ago
Parallel Randomized State-Space Search
Model checkers search the space of possible program behaviors to detect errors and to demonstrate their absence. Despite major advances in reduction and optimization techniques, s...
Matthew B. Dwyer, Sebastian G. Elbaum, Suzette Per...
123
Voted

Publication
1301views
16 years 25 days ago
Markovian Tracking-by-Detection from a Single, Uncalibrated Camera
We present an algorithm for multi-person tracking-bydetection in a particle filtering framework. To address the unreliability of current state-of-the-art object detectors, our a...
Michael D. Breitenstein, Fabian Reichlin, Bastian ...
89
Voted
PERCOM
2008
ACM
16 years 10 days ago
Topology Formation in IEEE 802.15.4: Cluster-Tree Characterization
The IEEE 802.15.4 standard defines a set of procedures to set-up a Low-Rate Wireless Personal Area Network where nodes self-organize into a logical communication structure through ...
Francesca Cuomo, Sara Della Luna, Petia Todorova, ...