Sciweavers

736 search results - page 110 / 148
» Classification with Scattering Operators
Sort
View
CHI
2010
ACM
14 years 2 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
CHI
2010
ACM
14 years 2 months ago
How does search behavior change as search becomes more difficult?
Search engines make it easy to check facts online, but finding some specific kinds of information sometimes proves to be difficult. We studied the behavioral signals that suggest ...
Anne Aula, Rehan M. Khan, Zhiwei Guan
CHI
2010
ACM
14 years 2 months ago
Experience, adjustment, and engagement: the role of video in law enforcement
Questions about the effectiveness of increasingly ubiquitous video technology in law enforcement have prompted an examination of the practices surrounding this technology. We pres...
Joe Tullio, Elaine M. Huang, David Wheatley, Harry...
CVPR
2009
IEEE
14 years 2 months ago
Sigma Set: A small second order statistical region descriptor
Given an image region of pixels, second order statistics can be used to construct a descriptor for object representation. One example is the covariance matrix descriptor, which sh...
Xiaopeng Hong, Hong Chang, Shiguang Shan, Xilin Ch...
CHI
2009
ACM
14 years 2 months ago
One-handed behind-the-display cursor input on mobile devices
Behind-the-display interaction has gained popularity for interactions on handheld devices as researchers have demonstrated the viability of such interactions on small devices. How...
Xing-Dong Yang, Pourang Irani, Pierre Boulanger, W...