Sciweavers

672 search results - page 11 / 135
» An assessment of tag presentation techniques
Sort
View
SDL
2007
152views Hardware» more  SDL 2007»
13 years 9 months ago
TTCN-3 Quality Engineering: Using Learning Techniques to Evaluate Metric Sets
Software metrics are an essential means to assess software quality. For the assessment of software quality, typically sets of complementing metrics are used since individual metric...
Edith Werner, Jens Grabowski, Helmut Neukirchen, N...
MM
2009
ACM
203views Multimedia» more  MM 2009»
14 years 9 days ago
Distance metric learning from uncertain side information with application to automated photo tagging
Automated photo tagging is essential to make massive unlabeled photos searchable by text search engines. Conventional image annotation approaches, though working reasonably well o...
Lei Wu, Steven C. H. Hoi, Rong Jin, Jianke Zhu, Ne...
CHI
2007
ACM
14 years 8 months ago
Mobile interaction with visual and RFID tags: a field study on user perceptions
In this paper, we present a study of user perceptions on mobile interaction with visual and RFID tags. Although mobile interaction with tags has been proposed in several earlier s...
Dan Greenblatt, Jonna Häkkilä, Kaj M&aum...
INFOCOM
2007
IEEE
14 years 1 months ago
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Abstract— Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present two privacy...
Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, ...
UCS
2004
Springer
14 years 1 months ago
Dependable Coding of Fiducial Tags
Fiducial tags can be recognised successfully and decoded by computer vision systems in order to produce location information. We term a system dependable if its observable results ...
Andrew C. Rice, Christopher B. Cain, John K. Fawce...