Sciweavers

619 search results - page 50 / 124
» More on Subfitness and Fitness
Sort
View
74
Voted
CHI
2010
ACM
15 years 5 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
15 years 5 months ago
Reexamining Threat Rigidity: Implications for Design
Emergencies today seem larger, more complex, and unique than those of the past. Responding to them requires flexibility and creativity not easily achieved. The threat-rigidity the...
Linda Plotnick, Murray Turoff, Gerd Van Den Eede
ISBRA
2009
Springer
15 years 5 months ago
Using Gene Expression Modeling to Determine Biological Relevance of Putative Regulatory Networks
Identifying gene regulatory networks from high-throughput gene expression data is one of the most important goals of bioinformatics, but it remains difficult to define what makes a...
Peter Larsen, Yang Dai
ERCIMDL
2009
Springer
167views Education» more  ERCIMDL 2009»
15 years 5 months ago
Conceptual Discovery of Educational Resources through Learning Objectives
This poster reports on current work with the NSF-funded Achievement Standards Network (ASN) to support discovery of educational resources in digital libraries using conceptual grap...
Stuart A. Sutton, Diny Golder
ICB
2009
Springer
134views Biometrics» more  ICB 2009»
15 years 5 months ago
A Model Based Approach for Expressions Invariant Face Recognition
This paper describes an idea of recognizing the human face in the presence of strong facial expressions using model based approach. The features extracted for the face image sequen...
Zahid Riaz, Christoph Mayer, Matthias Wimmer, Mich...