Sciweavers

11665 search results - page 2325 / 2333
» Human computing for EDA
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 7 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
IMC
2010
ACM
14 years 7 months ago
The impact of YouTube recommendation system on video views
Hosting a collection of millions of videos, YouTube offers several features to help users discover the videos of their interest. For example, YouTube provides video search, relate...
Renjie Zhou, Samamon Khemmarat, Lixin Gao
AVI
2010
14 years 7 months ago
An infrastructure for creating graphical indicators of the learner profile by mashing up different sources
The procedures to collect information about users are well known in computer science till long time. They range from getting explicit information from users, required in order to ...
Luca Mazzola, Riccardo Mazza
BMCBI
2010
162views more  BMCBI 2010»
14 years 7 months ago
SNPexp - A web tool for calculating and visualizing correlation between HapMap genotypes and gene expression levels
Background: Expression levels for 47294 transcripts in lymphoblastoid cell lines from all 270 HapMap phase II individuals, and genotypes (both HapMap phase II and III) of 3.96 mil...
Kristian Holm, Espen Melum, Andre Franke, Tom H. K...
97
Voted
CIVR
2010
Springer
227views Image Analysis» more  CIVR 2010»
14 years 7 months ago
Evaluating detection of near duplicate video segments
The automatic detection of near duplicate video segments, such as multiple takes of a scene or different news video clips showing the same event, has received growing research int...
Werner Bailer
« Prev « First page 2325 / 2333 Last » Next »