Sciweavers

878 search results - page 55 / 176
» Factors and effects of information credibility
Sort
View
ASSETS
2008
ACM
13 years 9 months ago
Creating and evaluating a video vocabulary for communicating verbs for different age groups
Icons and digital images used in augmentative and alternative communication (AAC) are not as effective in illustrating verbs, especially for people with cognitive degeneration or ...
Xiaojuan Ma, Perry R. Cook
ICIP
2010
IEEE
13 years 5 months ago
Functional vanishing point estimation via a filtered-Radon operator
When available, vanishing points in a scene are a key factor in effectively recovering absolute camera orientation, thus simplifying the structure-from-motion problem. We present ...
William Mantzel, Justin K. Romberg
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 1 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
ICIP
2008
IEEE
14 years 9 months ago
Face hallucination VIA sparse coding
In this paper, we address the problem of hallucinating a high resolution face given a low resolution input face. The problem is approached through sparse coding. To exploit the fa...
Jianchao Yang, Hao Tang, Yi Ma, Thomas S. Huang
WWW
2007
ACM
14 years 8 months ago
An assessment of tag presentation techniques
With the growth of social bookmarking a new approach for metadata creation called tagging has emerged. In this paper we evaluate the use of tag presentation techniques. The main g...
Martin Halvey, Mark T. Keane