Sciweavers

2648 search results - page 520 / 530
» Human Factors In Computer Security
Sort
View
ACMICEC
2007
ACM
148views ECommerce» more  ACMICEC 2007»
15 years 1 months ago
Pricing digital content with DRM mechanism
The Internet and file sharing technology (such as P2P network) significantly alleviate the content distribution cost. However, better digital content distribution also means that ...
Yung-Ming Li, Chia-Hao Lin
91
Voted
ASSETS
2007
ACM
15 years 1 months ago
Variable frame rate for low power mobile sign language communication
The MobileASL project aims to increase accessibility by enabling Deaf people to communicate over video cell phones in their native language, American Sign Language (ASL). Real-tim...
Neva Cherniavsky, Anna Cavender, Richard E. Ladner...
BIBE
2007
IEEE
129views Bioinformatics» more  BIBE 2007»
15 years 1 months ago
Statistial Analysis of nucleosome occupancy and histone modification data
Abstract-- In eukaryotic cells, genomic DNAs wrap around beadlike molecules, called nucleosomes, so as to pack more compactly in the nucleus of the cell. The nucleosome is made up ...
Guo-Cheng Yuan, Jun S. Liu
MIR
2010
ACM
191views Multimedia» more  MIR 2010»
15 years 1 months ago
Video retargeting with multi-scale trajectory optimization
Mobile devices are increasingly powerful in media storage and rendering. The prevalent request of decent video browsing on mobile devices is demanding. However, one limitation com...
Yuanning Li, YongHong Tian, Jingjing Yang, Ling-Yu...
67
Voted
ATAL
2006
Springer
15 years 1 months ago
Deploying a personalized time management agent
We report on our ongoing practical experience in designing, implementing, and deploying PTIME, a personalized agent for time management and meeting scheduling in an open, multi-ag...
Pauline Berry, Bart Peintner, Ken Conley, Melinda ...