Sciweavers

1005 search results - page 30 / 201
» Can machines call people
Sort
View
WOWMOM
2006
ACM
118views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Towards Blocking Outgoing Malicious Impostor Emails
Electronic mails (emails) have become an indispensable part of most people’s daily routines. However, they were not designed for deployment in an adversarial environment, which ...
Erhan J. Kartaltepe, Shouhuai Xu
HOTOS
1997
IEEE
13 years 12 months ago
What Synchronous Groupware Needs: Notification Services
Synchronous groupware is the class of applications in which two or more people collaborate in what they perceive to be real time. Most previous efforts to deploy synchronous group...
Mark Day
CVPR
2011
IEEE
13 years 4 months ago
Finding the Weakest Link in Person Detectors
Detecting people remains a popular and challenging problem in computer vision. In this paper, we analyze parts-based models for person detection to determine which components of t...
Devi Parikh, Larry Zitnick
TKDE
2008
154views more  TKDE 2008»
13 years 7 months ago
Analyzing the Structure and Evolution of Massive Telecom Graphs
Abstract-- With ever growing competition in telecommunications markets, operators have to increasingly rely on business intelligence to offer the right incentives to their customer...
Amit Anil Nanavati, Rahul Singh, Dipanjan Chakrabo...
ICALT
2005
IEEE
14 years 1 months ago
Modeling of Process-Oriented Learning Designs
Process-oriented learning designs (POLD) are used to describe innovative teaching activities (processes) that can be generalised and used across different disciplines. This paper ...
Olivera Marjanovic