Sciweavers

2399 search results - page 149 / 480
» On Authentication between Human and Computer
Sort
View
AMC
2007
134views more  AMC 2007»
15 years 4 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
HRI
2010
ACM
15 years 11 months ago
Following directions using statistical machine translation
—Mobile robots that interact with humans in an intuitive way must be able to follow directions provided by humans in unconstrained natural language. In this work we investigate h...
Cynthia Matuszek, Dieter Fox, Karl Koscher
CORR
2000
Springer
107views Education» more  CORR 2000»
15 years 4 months ago
How to Evaluate your Question Answering System Every Day and Still Get Real Work Done
In this paper, we report on Qaviar, an experimental automated evaluation system for question answering applications. The goal of our research was to find an automatically calculat...
Eric Breck, John D. Burger, Lisa Ferro, Lynette Hi...
HUC
1999
Springer
15 years 8 months ago
Close Encounters: Supporting Mobile Collaboration through Interchange of User Profiles
This paper introduces the notion of profile-based cooperation as a way to support awareness and informal communication between mobile users during chance encounters. We describe th...
Gerd Kortuem, Zary Segall, Thaddeus G. Cowan Thomp...
SIGCSE
2006
ACM
130views Education» more  SIGCSE 2006»
15 years 10 months ago
Scavenger hunt: computer science retention through orientation
This paper describes Scavenger Hunt, a team-based orientation activity for incoming freshmen in the Department of Computer Science at the University of Illinois at Urbana-Champaig...
Jerry O. Talton, Daniel L. Peterson, Sam Kamin, De...