Sciweavers

1029 search results - page 123 / 206
» Dependence Anti Patterns
Sort
View
CTW
2002
74views more  CTW 2002»
13 years 10 months ago
Nine Steps to Move Forward from Error
: Following celebrated failures stakeholders begin to ask questions about how to improve the systems and processes they operate, manage or depend on. In this process it is easy to ...
David D. Woods, Richard I. Cook
PR
2007
136views more  PR 2007»
13 years 9 months ago
Shadow compensation in 2D images for face recognition
Illumination variation that occurs on face images degrades the performance of face recognition. In this paper, we propose a novel approach to handling illumination variation for f...
Sang-Il Choi, Chunghoon Kim, Chong-Ho Choi
ISW
2010
Springer
13 years 8 months ago
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...
SICHERHEIT
2010
13 years 8 months ago
Towards Optimal Sensor Placement Strategies for Early Warning Systems
: A network early warning system consists of several distributed sensors to detect malicious network activity. The effectiveness of such early warning systems critically depends on...
Jan Göbel, Philipp Trinius
SIGDIAL
2010
13 years 8 months ago
Non-humanlike Spoken Dialogue: A Design Perspective
We propose a non-humanlike spoken dialogue design, which consists of two elements: non-humanlike turn-taking and non-humanlike acknowledgment. Two experimental studies are reporte...
Kotaro Funakoshi, Mikio Nakano, Kazuki Kobayashi, ...