Sciweavers

9028 search results - page 1709 / 1806
» Human-Computer Interaction Experiments
Sort
View
131
Voted
CSFW
2011
IEEE
14 years 2 months ago
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection
Abstract—Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely a...
Jeremiah Blocki, Nicolas Christin, Anupam Datta, A...
246
Voted
ICCV
2011
IEEE
13 years 12 months ago
Tracking by Sampling Trackers
We propose a novel tracking framework called visual tracker sampler that tracks a target robustly by searching for the appropriate trackers in each frame. Since the real-world trac...
junseok kwon and kyoung mu lee
131
Voted
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
13 years 10 months ago
Do Me a Solid? Information Asymmetry, Liking, and Compliance Gaining Online
As the popularity of interactive social media grows, it is increasingly normal for individuals to reveal significant amounts of personal information online. Although this informat...
Nathan J. Claes, Carolyn Hurley, Michael A. Stefan...
167
Voted
CVPR
2012
IEEE
13 years 5 months ago
Adaptive object tracking by learning background context
One challenge when tracking objects is to adapt the object representation depending on the scene context to account for changes in illumination, coloring, scaling, etc. Here, we p...
Ali Borji, Simone Frintrop, Dicky N. Sihite, Laure...
145
Voted
CVPR
2012
IEEE
13 years 5 months ago
Example-based 3D object reconstruction from line drawings
Recovering 3D geometry from a single 2D line drawing is an important and challenging problem in computer vision. It has wide applications in interactive 3D modeling from images, c...
Tianfan Xue, Jianzhuang Liu, Xiaoou Tang
« Prev « First page 1709 / 1806 Last » Next »