Sciweavers

2648 search results - page 512 / 530
» Human Factors In Computer Security
Sort
View
83
Voted
UIST
2009
ACM
15 years 4 months ago
Activity analysis enabling real-time video communication on mobile phones for deaf users
We describe our system called MobileASL for real-time video communication on the current U.S. mobile phone network. The goal of MobileASL is to enable Deaf people to communicate w...
Neva Cherniavsky, Jaehong Chon, Jacob O. Wobbrock,...
IROS
2008
IEEE
171views Robotics» more  IROS 2008»
15 years 4 months ago
Biomimetic grasp planning for cortical control of a robotic hand
— In this paper we outline a grasp planning system designed to augment the cortical control of a prosthetic arm and hand. A key aspect of this task is the presence of on-line use...
Matei T. Ciocarlie, Samuel T. Clanton, M. Chance S...
FUZZIEEE
2007
IEEE
15 years 3 months ago
Mining and Predicting CpG islands
— A DNA sequence can be described as a string composed of four symbols: A, T, C and G. Each symbol represents a chemically distinct nucleotide molecule. Combinations of two nucle...
Christopher Previti, Oscar Harari, Coral del Val
AIRWEB
2007
Springer
15 years 3 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
91
Voted
CIVR
2007
Springer
119views Image Analysis» more  CIVR 2007»
15 years 3 months ago
An in-memory relevance feedback technique for high-performance image retrieval systems
Content-based image retrieval with relevant feedback has been widely adopted as the query model of choice for improved effectiveness in image retrieval. The effectiveness of thi...
Ning Yu, Khanh Vu, Kien A. Hua