Sciweavers

1663 search results - page 155 / 333
» Computer Security in the Real World
Sort
View
125
Voted
AINA
2009
IEEE
15 years 10 months ago
Learning to Extract Content from News Webpages
We consider the problem of content extraction from online news webpages. To explore to what extent the syntactic markup and the visual structure of a webpage facilitate the extrac...
Alex Spengler, Patrick Gallinari
98
Voted
CHI
2009
ACM
15 years 10 months ago
Tracking behavior in persuasive apps: is sensor-based detection always better than user self-reporting?
This paper aims to discuss the roles for the two types of tracking user behavior. Considering these two types of tracking, sensor based recognition has a great advantage when sens...
Miyuki Shiraishi, Yasuyuki Washio, Chihiro Takayam...
134
Voted
CSE
2009
IEEE
15 years 10 months ago
Analysis of a Location-Based Social Network
—Location-based Social Networks (LSNs) allow users to see where their friends are, to search location-tagged content within their social graph, and to meet others nearby. The rec...
Nan Li, Guanling Chen
153
Voted
NCA
2009
IEEE
15 years 10 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman
119
Voted
CVPR
2008
IEEE
15 years 10 months ago
Modeling the structure of multivariate manifolds: Shape maps
We propose a shape population metric that reflects the interdependencies between points observed in a set of examples. It provides a notion of topology for shape and appearance m...
Georg Langs, Nikos Paragios