Sciweavers

6560 search results - page 1152 / 1312
» The Human Context of Information Systems
Sort
View
SIGIR
2009
ACM
15 years 8 months ago
Detecting spammers and content promoters in online video social networks
A number of online video social networks, out of which YouTube is the most popular, provides features that allow users to post a video as a response to a discussion topic. These f...
Fabrício Benevenuto, Tiago Rodrigues, Virg&...
MM
2005
ACM
107views Multimedia» more  MM 2005»
15 years 7 months ago
Spatio-temporal quality assessment for home videos
Compared with the video programs taken by professionals, home videos are always with low-quality content resulted from lack of professional capture skills. In this paper, we prese...
Tao Mei, Cai-Zhi Zhu, He-Qin Zhou, Xian-Sheng Hua
ICSOC
2004
Springer
15 years 7 months ago
A service-oriented architecture for digital libraries
CiteSeer is currently a very large source of meta-data information on the World Wide Web (WWW). This meta-data is the key material for the Semantic Web. Still, CiteSeer is not yet...
Yves Petinot, C. Lee Giles, Vivek Bhatnagar, Prade...
MM
2010
ACM
151views Multimedia» more  MM 2010»
15 years 1 months ago
Enhanced exploration of oral history archives through processed video and synchronized text transcripts
A digital video library of over 900 hours of video and 18000 stories from The HistoryMakers was used by 266 students, faculty, librarians, and life-long learners interacting with ...
Michael G. Christel, Scott M. Stevens, Bryan Maher...
WISEC
2010
ACM
15 years 1 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
« Prev « First page 1152 / 1312 Last » Next »