Sciweavers

935 search results - page 122 / 187
» Some Results on Orthogonal Factorizations
Sort
View
MM
2006
ACM
166views Multimedia» more  MM 2006»
15 years 3 months ago
Video retargeting: automating pan and scan
When a video is displayed on a smaller display than originally intended, some of the information in the video is necessarily lost. In this paper, we introduce Video Retargeting th...
Feng Liu, Michael Gleicher
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer
OZCHI
2006
ACM
15 years 3 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
SIGCSE
2006
ACM
135views Education» more  SIGCSE 2006»
15 years 3 months ago
Personality types, learning styles, and an agile approach to software engineering education
This paper describes an initiative at North Carolina State University in which the undergraduate software engineering class was restructured in layout and in presentation. The cha...
Lucas Layman, Travis Cornwell, Laurie A. Williams
HICSS
2005
IEEE
83views Biometrics» more  HICSS 2005»
15 years 3 months ago
Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Heng Xu, Hao Wang, Hock-Hai Teo