Sciweavers

2347 search results - page 116 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
PVLDB
2008
132views more  PVLDB 2008»
14 years 9 months ago
Access control over uncertain data
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Vibhor Rastogi, Dan Suciu, Evan Welbourne
ALGORITHMS
2010
113views more  ALGORITHMS 2010»
14 years 7 months ago
A Complete Theory of Everything (Will Be Subjective)
Increasingly encompassing models have been suggested for our world. Theories range from generally accepted to increasingly speculative to apparently bogus. The progression of theo...
Marcus Hutter
ICCV
2011
IEEE
13 years 10 months ago
Strong Supervision From Weak Annotation: Interactive Training of Deformable Part Models
We propose a framework for large scale learning and annotation of structured models. The system interleaves interactive labeling (where the current model is used to semiautomate t...
Steven Branson, Pietro Perona, Serge Belongie
ICCV
2011
IEEE
13 years 10 months ago
Real-time Indoor Scene Understanding using Bayesian Filtering with Motion Cues
We present a method whereby an embodied agent using visual perception can efficiently create a model of a local indoor environment from its experience of moving within it. Our me...
Grace Tsai, Changhai Xu, Jingen Liu, Benjamin Kuip...
HICSS
2006
IEEE
141views Biometrics» more  HICSS 2006»
15 years 4 months ago
Temporal Implications of Information Technology for Work Practices: Organizing in and for Time in an Emergency Department
We investigate the temporal implications of information technology by examining its use in the work practices of physicians and nurses in an emergency department. We conceptualize...
Zixing Shen, Youngjin Yoo, Kalle Lyytinen