Sciweavers

26472 search results - page 5126 / 5295
» Interactive
Sort
View
MM
2010
ACM
151views Multimedia» more  MM 2010»
15 years 4 months ago
Enhanced exploration of oral history archives through processed video and synchronized text transcripts
A digital video library of over 900 hours of video and 18000 stories from The HistoryMakers was used by 266 students, faculty, librarians, and life-long learners interacting with ...
Michael G. Christel, Scott M. Stevens, Bryan Maher...
MM
2010
ACM
163views Multimedia» more  MM 2010»
15 years 4 months ago
Sonify your face: facial expressions for sound generation
We present a novel visual creativity tool that automatically recognizes facial expressions and tracks facial muscle movements in real time to produce sounds. The facial expression...
Roberto Valenti, Alejandro Jaimes, Nicu Sebe
MM
2010
ACM
182views Multimedia» more  MM 2010»
15 years 4 months ago
A 3d data intensive tele-immersive grid
Networked virtual environments like Second Life enable distant people to meet for leisure as well as work. But users are represented through avatars controlled by keyboards and mo...
Benjamin Petit, Thomas Dupeux, Benoit Bossavit, Jo...
MOBICOM
2010
ACM
15 years 4 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
CCS
2010
ACM
15 years 4 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
« Prev « First page 5126 / 5295 Last » Next »