Sciweavers

2347 search results - page 132 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
15 years 11 months ago
Weighted Proximity Best-Joins for Information Retrieval
We consider the problem of efficiently computing weighted proximity best-joins over multiple lists, with applications in information retrieval and extraction. We are given a multi-...
AnHai Doan, Haixun Wang, Hao He, Jun Yang 0001, Ri...
CHI
2005
ACM
15 years 10 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
CVPR
2010
IEEE
15 years 6 months ago
Boundary Learning by Optimization with Topological Constraints
Recent studies have shown that machine learning can improve the accuracy of detecting object boundaries in images. In the standard approach, a boundary detector is trained by mini...
Viren Jain, Benjamin Bollmann, Bobby Kasthuri, Ken...
CHI
2010
ACM
15 years 4 months ago
Newport: enabling sharing during mobile calls
Newport is a collaborative application for sharing context (e.g. location) and content (e.g. photos and notes) during mobile phone calls. People can share during a phone call and ...
Junius Gunaratne, A. J. Bernheim Brush
CSCW
2010
ACM
15 years 4 months ago
Throwing voices: the psychological impact of the spatial height of projected voices
Communication mediating technologies are throwing our voices away from our bodies in situations ranging from voice conference meetings to mass presentations. Physical height is kn...
Leila Takayama, Clifford Nass