Sciweavers

15325 search results - page 114 / 3065
» People in Computer Vision
Sort
View
CHI
2007
ACM
16 years 4 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
136
Voted
SACMAT
2004
ACM
15 years 9 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
115
Voted
CVPR
1997
IEEE
16 years 6 months ago
Learning and Recognizing Human Dynamics in Video Sequences
Christoph Bregler
141
Voted
CVPR
1997
IEEE
16 years 6 months ago
Projective registration with difference decomposition
Michael Gleicher