Sciweavers

1014 search results - page 185 / 203
» The Business Case of HCI
Sort
View
CSREASAM
2010
14 years 7 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
IANDC
2010
115views more  IANDC 2010»
14 years 7 months ago
18th International Conference on Concurrency Theory
We consider message sequence charts enriched with timing constraints between pairs of events. As in the untimed setting, an infinite family of time-constrained message sequence cha...
Luís Caires, Vasco Thudichum Vasconcelos
115
Voted
CVPR
2011
IEEE
14 years 5 months ago
Monocular 3D Scene Understanding with Explicit Occlusion Reasoning
Scene understanding from a monocular, moving camera is a challenging problem with a number of applications including robotics and automotive safety. While recent systems have show...
Christian Wojek, Stefan Walk, Stefan Roth, Bernt S...
IEEEVAST
2010
14 years 4 months ago
Understanding text corpora with multiple facets
Text visualization becomes an increasingly more important research topic as the need to understand massive-scale textual information is proven to be imperative for many people and...
Lei Shi, Furu Wei, Shixia Liu, Li Tan, Xiaoxiao Li...
JDCTA
2010
150views more  JDCTA 2010»
14 years 4 months ago
Proof as Composition: An approach for the Large-granularity Web Services Composition
The large-granularity Web services are a new form of Web services. In contrast to the traditional Web services, they often have more interfaces, encapsulate more complex business ...
Yuyu Yin, Ying Li, Jianwei Yin, ShuiGuang Deng