Sciweavers

1663 search results - page 271 / 333
» Computer Security in the Real World
Sort
View
154
Voted
DASFAA
2010
IEEE
220views Database» more  DASFAA 2010»
15 years 1 months ago
An Effective Object-Level XML Keyword Search
Keyword search is widely recognized as a convenient way to retrieve information from XML data. In order to precisely meet users' search concerns, we study how to effectively r...
Zhifeng Bao, Jiaheng Lu, Tok Wang Ling, Liang Xu, ...
132
Voted
UIST
2010
ACM
15 years 1 months ago
Combining multiple depth cameras and projectors for interactions on, above and between surfaces
Instrumented with multiple depth cameras and projectors, LightSpace is a small room installation designed to explore a variety of interactions and computational strategies related...
Andrew D. Wilson, Hrvoje Benko
UIST
2010
ACM
15 years 1 months ago
Gesture search: a tool for fast mobile data access
Modern mobile phones can store a large amount of data, such as contacts, applications and music. However, it is difficult to access specific data items via existing mobile user in...
Yang Li
ICMLA
2009
15 years 1 months ago
Discovering Rules from Disk Events for Predicting Hard Drive Failures
Detecting impending failure of hard disks is an important prediction task which might help computer systems to prevent loss of data and performance degradation. Currently most of t...
Vipul Agarwal, Chiranjib Bhattacharyya, Thirumale ...
154
Voted
PAMI
2011
14 years 10 months ago
Linearized Motion Estimation for Articulated Planes
—In this paper, we describe the explicit application of articulation constraints for estimating the motion of a system of articulated planes. We relate articulations to the relat...
Ankur Datta, Yaser Sheikh, Takeo Kanade