Sciweavers

2648 search results - page 274 / 530
» Human Factors In Computer Security
Sort
View
139
Voted
SDM
2010
SIAM
146views Data Mining» more  SDM 2010»
15 years 5 months ago
Towards Finding Valuable Topics
Enterprises depend on their information workers finding valuable information to be productive. However, existing enterprise search and recommendation systems can exploit few studi...
Zhen Wen, Ching-Yung Lin
140
Voted
BMCBI
2007
148views more  BMCBI 2007»
15 years 3 months ago
WeederH: an algorithm for finding conserved regulatory motifs and regions in homologous sequences
Background: This work addresses the problem of detecting conserved transcription factor binding sites and in general regulatory regions through the analysis of sequences from homo...
Giulio Pavesi, Federico Zambelli, Graziano Pesole
144
Voted
AVSS
2003
IEEE
15 years 9 months ago
Automatic Face Region Tracking for Highly Accurate Face Recognition in Unconstrained Environments
In this paper, we present a combined real-time face region tracking and highly accurate face recognition technique for an intelligent surveillance system. Highresolution face imag...
Young-Ouk Kim, Joon Ki Paik, Jingu Heo, Andreas Ko...
138
Voted
CHI
2005
ACM
16 years 4 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
145
Voted
HUC
2009
Springer
15 years 8 months ago
Privately querying location-based services with SybilQuery
To usefully query a location-based service, a mobile device must typically present its own location in its query to the server. This may not be acceptable to clients that wish to ...
Pravin Shankar, Vinod Ganapathy, Liviu Iftode