Sciweavers

2564 search results - page 157 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
ICIP
2010
IEEE
15 years 1 months ago
Saliency detection based on short-term sparse representation
Representation and measurement are two important issues for saliency models. Different with previous works that learnt sparse features from large scale natural statistics, we prop...
Xiaoshuai Sun, Hongxun Yao, Rongrong Ji, Pengfei X...
CHI
2008
ACM
16 years 3 months ago
The LilyPad Arduino: using computational textiles to investigate engagement, aesthetics, and diversity in computer science educa
The advent of novel materials (such as conductive fibers) combined with accessible embedded computing platforms have made it possible to re-imagine the landscapes of fabric and el...
Leah Buechley, Michael Eisenberg, Jaime Catchen, A...
CHI
2003
ACM
16 years 3 months ago
Identity disclosure and the creation of social capital
In this paper, we describe the identity policy decisions for a community network outside of Boston, Massachusetts. To promote trust and accountability, a member's online iden...
David R. Millen, John F. Patterson
EUROITV
2008
Springer
15 years 4 months ago
ShapeShifting Documentary: A Golden Age
Abstract. ShapeShifting TV denotes an approach to interactive television programmes that can adapt during delivery to the preferences of the active viewers. ShapeShifting TV is bas...
Vilmos Zsombori, Marian Florin Ursu, John Wyver, I...
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
16 years 8 days ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal