Sciweavers

3224 search results - page 540 / 645
» Review of Affective Computing
Sort
View
150
Voted
CCS
2008
ACM
15 years 5 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
IMAMS
2007
115views Mathematics» more  IMAMS 2007»
15 years 5 months ago
Segmenting Periodic Reliefs on Triangle Meshes
Decorative reliefs are widely used for e.g. packaging and porcelain design. In periodic reliefs, the relief repeats a pattern, for example all the way around an underlying surface...
Shenglan Liu, Ralph R. Martin, Frank C. Langbein, ...
AAAI
1998
15 years 5 months ago
Fast Probabilistic Modeling for Combinatorial Optimization
Probabilistic models have recently been utilized for the optimization of large combinatorial search problems. However, complex probabilistic models that attempt to capture interpa...
Shumeet Baluja, Scott Davies
126
Voted
BIRTHDAY
2010
Springer
15 years 3 months ago
The Edge of Graph Transformation - Graphs for Behavioural Specification
The title of this paper, besides being a pun, can be taken to mean either the frontier of research in graph transformation, or the advantage of using graph transformation. To focus...
Arend Rensink
150
Voted
CCS
2010
ACM
15 years 3 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...