Trust has been considered a central aspect of successful IT outsourcing from the beginning of the outsourcing relationship to the end. A great deal of interest in trust has been d...
Computer vision techniques have been applied for rapid
and accurate structure recovery in many fields. Most methods
perform poorly in areas containing little or no texture
and i...
Rohith MV, Gowri Somanath, Debra Norris, Jennifer ...
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
Many on-line photo sharing systems allow users to tag their images so as to support semantic image search. In this paper, we study how one can take advantages of the already-tagge...
Ning Zhou, W. K. Cheung, Xiangyang Xue, Guoping Qi...
Human-Computer Interaction (HCI) is defined by the Association for Computing Machinery (ACM) Special Interest Group on Computer-Human Interaction (SIGCHI) as “a discipline conce...
Christine E. Wania, Michael E. Atwood, Katherine W...