Sciweavers

32 search results - page 5 / 7
» Explaining information systems change: a punctuated socio-te...
Sort
View
UIC
2009
Springer
14 years 2 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
WSDM
2012
ACM
207views Data Mining» more  WSDM 2012»
12 years 3 months ago
Domain bias in web search
This paper uncovers a new phenomenon in web search that we call domain bias — a user’s propensity to believe that a page is more relevant just because it comes from a particul...
Samuel Ieong, Nina Mishra, Eldar Sadikov, Li Zhang
BC
1998
98views more  BC 1998»
13 years 7 months ago
The dynamics of long-term exploration in the rat
A simple analytical model is proposed here that captures to a large extent the kinematic structure of rat exploratory behavior. Previous studies have shown that such behavior consi...
Ofer Tchernichovski, Yoav Benjamini, Ilan Golani
CVPR
2011
IEEE
13 years 2 months ago
A Complete Statistical Inverse Ray Tracing Approach to Multi-view Stereo
This paper presents a complete solution to estimating a scene’s 3D geometry and appearance from multiple 2D images by using a statistical inverse ray tracing method. Instead of ...
Shubao Liu, David Cooper
IM
2003
13 years 8 months ago
Generic On-Line Discovery of Quantitative Models for Service Level Management
: Quantitative models are needed for a variety of management tasks, including (a) identification of critical variables to use for health monitoring, (b) anticipating service level...
Yixin Diao, Frank Eskesen, Steve Froehlich, Joseph...