Sciweavers

308 search results - page 14 / 62
» Capturing User Interests by Both Exploitation and Exploratio...
Sort
View
IPPS
2003
IEEE
14 years 1 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
CVPR
2008
IEEE
14 years 9 months ago
Information-theoretic active scene exploration
Studies support the need for high resolution imagery to identify persons in surveillance videos[13]. However, the use of telephoto lenses sacrifices a wider field of view and ther...
Eric Sommerlade, Ian Reid
ICSE
2009
IEEE-ACM
14 years 8 months ago
Tesseract: Interactive visual exploration of socio-technical relationships in software development
Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...
CSCW
2010
ACM
14 years 4 months ago
Sonic souvenirs: exploring the paradoxes of recorded sound for family remembering
We explore the role of sound as a medium for social reminiscing: 10 families were involved in recording ‘sonic souvenirs’ of their holidays. They shared and discussed their co...
Lina Dib, Daniela Petrelli, Steve Whittaker
PVLDB
2008
157views more  PVLDB 2008»
13 years 6 months ago
SEDA: a system for search, exploration, discovery, and analysis of XML Data
Keyword search in XML repositories is a powerful tool for interactive data exploration. Much work has recently been done on making XML search aware of relationship information emb...
Andrey Balmin, Latha S. Colby, Emiran Curtmola, Qu...