Sciweavers

7839 search results - page 326 / 1568
» What's there and what's not
Sort
View
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 6 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
126
Voted
CHI
1997
ACM
15 years 6 months ago
Sensing Activity in Video Images
in CHI’97 Extended Abstract, ACM Press, pp. 319-320 based awareness tools and iconic indicators because it meets three crucial user requirements. This paper describes the activit...
Alison Lee, Kevin Schlueter, Andreas Girgensohn
121
Voted
SIGCSE
2002
ACM
229views Education» more  SIGCSE 2002»
15 years 1 months ago
GraphicsMentor: a tool for learning graphics fundamentals
This paper discusses the functionality of GraphicsMentor. GraphicsMentor permits a student to modify many parameters of the camera, objects, and light sources interactively, and t...
Dejan Nikolic, Ching-Kuang Shene
ICDE
2002
IEEE
106views Database» more  ICDE 2002»
16 years 3 months ago
OSSM: A Segmentation Approach to Optimize Frequency Counting
Computing the frequency of a pattern is one of the key operations in data mining algorithms. We describe a simple yet powerful way of speeding up any form of frequency counting sa...
Carson Kai-Sang Leung, Raymond T. Ng, Heikki Manni...
AVSS
2005
IEEE
15 years 7 months ago
Look there! Predicting where to look for motion in an active camera network
A framework is proposed that answers the following question: if a moving object is observed by one camera in a pan-tilt-zoom (PTZ) camera network, what other camera(s) might be fo...
Ugur Murat Erdem, Stan Sclaroff