Sciweavers

12783 search results - page 2436 / 2557
» Experimenting with computing
Sort
View
HT
2009
ACM
15 years 11 months ago
Cross-tagging for personalized open social networking
The Social Web is successfully established and poised for continued growth. Web 2.0 applications such as blogs, bookmarking, music, photo and video sharing systems are among the m...
Avare Stewart, Ernesto Diaz-Aviles, Wolfgang Nejdl...
IMC
2009
ACM
15 years 11 months ago
Network level footprints of facebook applications
With over half a billion users, Online Social Networks (OSNs) are the major new applications on the Internet. Little information is available on the network impact of OSNs, althou...
Atif Nazir, Saqib Raza, Dhruv Gupta, Chen-Nee Chua...
MM
2009
ACM
172views Multimedia» more  MM 2009»
15 years 11 months ago
Concept, content and the convict
This paper describes the concepts behind and implementation of the multimedia art work Alan01 / AlanOnline, which wakes up the 1952 criminally convicted Alan Turing as a piece of ...
Mika Luma Tuomola, Teemu Korpilahti, Jaakko Pesone...
MM
2009
ACM
157views Multimedia» more  MM 2009»
15 years 11 months ago
Face image modeling by multilinear subspace analysis with missing values
The main difficulty in face image modeling is to decompose those semantic factors contributing to the formation of the face images, such as identity, illumination and pose. One p...
Xin Geng, Kate Smith-Miles, Zhi-Hua Zhou, Liang Wa...
SACMAT
2009
ACM
15 years 11 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
« Prev « First page 2436 / 2557 Last » Next »