Sciweavers

490 search results - page 28 / 98
» Artist As Researcher, Understanding The Tools
Sort
View
MM
2006
ACM
157views Multimedia» more  MM 2006»
14 years 1 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
MM
2004
ACM
158views Multimedia» more  MM 2004»
14 years 1 months ago
"Sousveillance": inverse surveillance in multimedia imaging
This is a personal narrative that began 30 years ago as a childhood hobby, of wearing and implanting various sensors, effectors, and multimedia computation in order to re-define...
Steve Mann
IDEAL
2004
Springer
14 years 1 months ago
The Application of K-Medoids and PAM to the Clustering of Rules
Abstract. Earlier research has resulted in the production of an ‘allrules’ algorithm for data-mining that produces all conjunctive rules of above given confidence and coverage...
Alan P. Reynolds, Graeme Richards, Victor J. Raywa...
VL
2009
IEEE
126views Visual Languages» more  VL 2009»
14 years 2 months ago
Revealing the copy and paste habits of end users
Transferring data across applications is a common end user task, and copying and pasting via the clipboard lets users do so relatively easily. Using the clipboard, however, can al...
Kathryn T. Stolee, Sebastian G. Elbaum, Gregg Roth...
CLUSTER
2007
IEEE
14 years 2 months ago
Sequential and parallel implementation of a constraint-based algorithm for searching protein structures
— Data mining in biological structure libraries can be a powerful tool to better understand biochemical processes. This article introduces the LISA algorithm which enables the re...
Sascha Hunold, Thomas Rauber, Georg Wille