Sciweavers

2290 search results - page 334 / 458
» Extensible Protected Types
Sort
View
205
Voted
AICT
2009
IEEE
172views Communications» more  AICT 2009»
15 years 9 months ago
A Practical Characterization of 802.11 Access Points in Paris
Unlike other wireless technologies, the deployment of 802.11 networks is not limited to operators: access points can easily be installed by end-users for domestic use. This singul...
Guillaume Valadon, Florian Le Goff, Christophe Ber...
120
Voted
AVSS
2009
IEEE
15 years 9 months ago
An Ontology for Event Detection and its Application in Surveillance Video
In this paper, we propose an ontology for representing the prior knowledge related to video event analysis. It is composed of two types of knowledge related to the application dom...
Juan Carlos San Miguel, José María M...
CHI
2009
ACM
15 years 9 months ago
Awareness, training and trust in interaction with adaptive spam filters
Even though adaptive (trainable) spam filters are a common example of systems that make (semi-)autonomous decisions on behalf of the user, trust in these filters has been underexp...
Henriette S. M. Cramer, Vanessa Evers, Maarten van...
147
Voted
SAC
2009
ACM
15 years 9 months ago
A personalized framework for trust assessment
The number of computational trust models has been increasing rapidly in recent years, yet their applications for automating trust evaluation are still limited. The main obstacle i...
Trung Dong Huynh
123
Voted
SI3D
2009
ACM
15 years 9 months ago
Approximating dynamic global illumination in image space
Physically plausible illumination at real-time framerates is often achieved using approximations. One popular example is ambient occlusion (AO), for which very simple and efficie...
Tobias Ritschel, Thorsten Grosch, Hans-Peter Seide...