Sciweavers

2399 search results - page 76 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2007
ACM
15 years 10 months ago
An initial investigation into non-visual computer supported collaboration
In this paper we present an initial study of computer supported collaboration between visually impaired users based around the interactive browsing and manipulation of simple grap...
David K. McGookin, Stephen A. Brewster
TAMODIA
2008
14 years 11 months ago
Information Supply Mechanisms in Ubiquitous Computing, Crisis Management and Workflow Modelling
Abstract. The successful application of ubiquitous computing in crisis management requires a thorough understanding of the mechanisms that extract information from sensors and comm...
Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M....
ECCV
2006
Springer
15 years 11 months ago
Monocular Tracking of 3D Human Motion with a Coordinated Mixture of Factor Analyzers
Filtering based algorithms have become popular in tracking human body pose. Such algorithms can suffer the curse of dimensionality due to the high dimensionality of the pose state ...
Rui Li, Ming-Hsuan Yang, Stan Sclaroff, Tai-Peng T...
NAR
2007
149views more  NAR 2007»
14 years 9 months ago
UniHI: an entry gate to the human protein interactome
Systematic mapping of protein–protein interactions has become a central task of functional genomics. To map the human interactome, several strategies have recently been pursued....
Gautam Chaurasia, Yasir Iqbal, Christian Häni...
COMCOM
2007
149views more  COMCOM 2007»
14 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao