Sciweavers

2648 search results - page 465 / 530
» Human Factors In Computer Security
Sort
View
CVPR
2006
IEEE
15 years 12 months ago
Hidden Conditional Random Fields for Gesture Recognition
We introduce a discriminative hidden-state approach for the recognition of human gestures. Gesture sequences often have a complex underlying structure, and models that can incorpo...
Sy Bor Wang, Ariadna Quattoni, Louis-Philippe More...
WWW
2009
ACM
15 years 10 months ago
An experimental study of large-scale mobile social network
Mobile social network is a typical social network where one or more individuals of similar interests or commonalities, conversing and connecting with one another using the mobile ...
Zheng-Bin Dong, Guo-Jie Song, Kun-Qing Xie, Jing-Y...
WWW
2005
ACM
15 years 10 months ago
Making RDF presentable: integrated global and local semantic Web browsing
This paper discusses generating document structure from annotated media repositories in a domain-independent manner. This approaches the vision of a universal RDF browser. We star...
Lloyd Rutledge, Jacco van Ossenbruggen, Lynda Hard...
CHI
2008
ACM
15 years 10 months ago
LivOlay: interactive ad-hoc registration and overlapping of applications for collaborative visual exploration
The interoperability of disparate data types and sources has been a long standing problem and a hindering factor for the efficacy and efficiency in visual exploration applications...
Hao Jiang, Daniel Wigdor, Clifton Forlines, Michel...
CHI
2007
ACM
15 years 10 months ago
Why we tag: motivations for annotation in mobile and online media
Why do people tag? Users have mostly avoided annotating media such as photos ? both in desktop and mobile environments ? despite the many potential uses for annotations, including...
Morgan Ames, Mor Naaman