Sciweavers

320 search results - page 56 / 64
» Recognizing Human Actions Using Key Poses
Sort
View
CHI
1996
ACM
15 years 1 months ago
Technomethodology: Paradoxes and Possibilities
The design of CSCW systems has often had its roots in ethnomethodological understandings of work and investigations of working settings. Increasingly, we are also seeing these ide...
Graham Button, Paul Dourish
ICMI
2005
Springer
136views Biometrics» more  ICMI 2005»
15 years 3 months ago
Contextual recognition of head gestures
Head pose and gesture offer several key conversational grounding cues and are used extensively in face-to-face interaction among people. We investigate how dialog context from an ...
Louis-Philippe Morency, Candace L. Sidner, Christo...
EUROSYS
2010
ACM
15 years 2 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
AVBPA
2003
Springer
582views Biometrics» more  AVBPA 2003»
15 years 3 months ago
Performance Evaluation of Face Recognition Algorithms on the Asian Face Database, KFDB
Human face is one of the most common and useful keys to a person’s identity. Many algorithms have been developed for automatic face recognition. And a number of commercial produc...
Bon-Woo Hwang, Hyeran Byun, Myung-Cheol Roh, Seong...
CLUSTER
2007
IEEE
14 years 11 months ago
Blutopia: Stackable storage for cluster management
— The complexity of today’s computer systems poses a challenge to system administrators. Current systems comprise a multitude of inter-related software components running on di...
Fábio Oliveira, Gorka Guardiola, Jay A. Pat...