Sciweavers

7984 search results - page 1500 / 1597
» Exploring personal information
Sort
View
ICCV
2011
IEEE
14 years 3 months ago
Discovering Object Instances from Scenes of Daily Living
We propose an approach to identify and segment objects from scenes that a person (or robot) encounters in Activities of Daily Living (ADL). Images collected in those cluttered sce...
Hongwen Kang, Martial Hebert, Takeo Kanade
162
Voted
CCS
2011
ACM
14 years 3 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
135
Voted
CCS
2011
ACM
14 years 3 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
EMMCVPR
2011
Springer
14 years 3 months ago
Data-Driven Importance Distributions for Articulated Tracking
Abstract. We present two data-driven importance distributions for particle filterbased articulated tracking; one based on background subtraction, another on depth information. In ...
Søren Hauberg, Kim Steenstrup Pedersen
183
Voted
WSDM
2012
ACM
207views Data Mining» more  WSDM 2012»
13 years 11 months ago
Domain bias in web search
This paper uncovers a new phenomenon in web search that we call domain bias — a user’s propensity to believe that a page is more relevant just because it comes from a particul...
Samuel Ieong, Nina Mishra, Eldar Sadikov, Li Zhang
« Prev « First page 1500 / 1597 Last » Next »