Sciweavers

410 search results - page 15 / 82
» A micro-ethical view on computing practice
Sort
View
COMPSEC
2004
156views more  COMPSEC 2004»
13 years 8 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
ICRA
2005
IEEE
159views Robotics» more  ICRA 2005»
14 years 2 months ago
Omnidirectional Depth Computation from a Single Image
— Omnidirectional cameras offer a much wider field of view than the perspective ones and alleviate the problems due to occlusions. However, both types of cameras suffer from the...
Radu Orghidan, El Mustapha Mouaddib, Joaquim Salvi
IBPRIA
2005
Springer
14 years 2 months ago
A Computer Vision Sensor for Panoramic Depth Perception
A practical way for obtaining depth in computer vision is the use of structured light systems. For panoramic depth reconstruction several images are needed which most likely implie...
Radu Orghidan, El Mustapha Mouaddib, Joaquim Salvi
IEEEICCI
2006
IEEE
14 years 2 months ago
User-centered Interactive Data Mining
While many data mining models concentrate on automation and efficiency, interactive data mining models focus on adaptive and effective communications between human users and comp...
Yan Zhao, Yaohua Chen, Yiyu Yao
FECS
2006
529views Education» more  FECS 2006»
13 years 9 months ago
Student Projects in Computer Networking: Simulation versus Coding
In this paper, we discuss the advantages and disadvantages of using network simulators to teach networking concepts versus having students write programs. The authors have experie...
Leann Christianson, Kevin Q. Brown