Sciweavers

1455 search results - page 277 / 291
» Exploiting Myopic Learning
Sort
View
146
Voted
UM
2009
Springer
15 years 9 months ago
Narcissus: Group and Individual Models to Support Small Group Work
Long term group work by small teams is a central part of many learning and workplace activities. Widespread group support tools such as wikis, version control systems and issue tra...
Kimberley Upton, Judy Kay
139
Voted
MM
2009
ACM
178views Multimedia» more  MM 2009»
15 years 9 months ago
Semantic context transfer across heterogeneous sources for domain adaptive video search
Automatic video search based on semantic concept detectors has recently received significant attention. Since the number of available detectors is much smaller than the size of h...
Yu-Gang Jiang, Chong-Wah Ngo, Shih-Fu Chang
121
Voted
SIGGRAPH
2009
ACM
15 years 9 months ago
Educating technophile artists: experiences from a highly successful computer animation undergraduate programme
Over the past few decades, the arts have become increasingly dependent on and influenced by the development of computer technology. In the 1960s pioneering artists experimented w...
Peter Comninos, Leigh McLoughlin, Eike Falk Anders...
AINA
2008
IEEE
15 years 9 months ago
Missing Value Estimation for Time Series Microarray Data Using Linear Dynamical Systems Modeling
The analysis of gene expression time series obtained from microarray experiments can be effectively exploited to understand a wide range of biological phenomena from the homeostat...
Connie Phong, Raul Singh
FOCS
2007
IEEE
15 years 8 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak