Sciweavers

3884 search results - page 774 / 777
» A simplified modeling approach for human system interaction
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 6 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
CVPR
2011
IEEE
13 years 4 months ago
Real Time Head Pose Estimation with Random Regression Forests
Fast and reliable algorithms for estimating the head pose are essential for many applications and higher-level face analysis tasks. We address the problem of head pose estimation ...
Gabriele Fanelli, Juergen Gall, Luc VanGool
VIS
2006
IEEE
157views Visualization» more  VIS 2006»
14 years 9 months ago
Analyzing Complex FTMS Simulations: a Case Study in High-Level Visualization of Ion Motions
Current practice in particle visualization renders particle position data directly onto the screen as points or glyphs. Using a camera placed at a fixed position, particle motions...
Wojciech Burakiewicz, Robert van Liere
SIGSOFT
2007
ACM
14 years 9 months ago
Mining API patterns as partial orders from source code: from usage scenarios to specifications
A software system interacts with third-party libraries through various APIs. Using these library APIs often needs to follow certain usage patterns. Furthermore, ordering rules (sp...
Mithun Acharya, Tao Xie, Jian Pei, Jun Xu
DEXA
2009
Springer
166views Database» more  DEXA 2009»
14 years 3 months ago
Tags4Tags: Using Tagging to Consolidate Tags
Tagging has become increasingly popular and useful across various social networks and applications. It allows users to classify and organize resources for improving the retrieval p...
Leyla Jael García-Castro, Martin Hepp, Alex...