Sciweavers

148 search results - page 10 / 30
» Flickr: Who is Looking
Sort
View
CVPR
2000
IEEE
14 years 11 months ago
Visual Websearching Using Iconic Queries
Imagine a professional Web site designer who constantly has to come up with innovative looks for the client's homepages? How does he find the new content? The major search en...
Michael S. Lew, Nicu Sebe
CHI
2002
ACM
14 years 10 months ago
Small screen access to digital libraries
This paper looks at the possibilities of taking existing digital library technology and using it for educating those who do not normally have access to the Internet. We have built...
Gary Marsden, Robert Cherry, Alan Haefele
ARTCOM
2009
IEEE
14 years 4 months ago
Sender-Side Public Key Deniable Encryption Scheme
— Consider a situation in which the transmission of encrypted message is intercepted by an adversary who can later ask the sender to reveal the random choices (and also the secre...
Jaydeep Howlader, Saikat Basu
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
14 years 4 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
ETRA
2006
ACM
122views Biometrics» more  ETRA 2006»
14 years 3 months ago
Analyzing individual performance of source code review using reviewers' eye movement
This paper proposes to use eye movements to characterize the performance of individuals in reviewing source code of computer programs. We first present an integrated environment t...
Hidetake Uwano, Masahide Nakamura, Akito Monden, K...