Sciweavers

3013 search results - page 503 / 603
» HCI for the real world
Sort
View
COMSUR
2011
203views Hardware» more  COMSUR 2011»
12 years 9 months ago
Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious In
Interference is an unavoidable property of the wireless communication medium and, in sensor networks, such interference is exacerbated due to the energy-starved nature of the netw...
Maxwell Young, Raouf Boutaba
WEBI
2005
Springer
14 years 2 months ago
Page-reRank: Using Trusted Links to Re-Rank Authority
The basis of much of the intelligence on the Web is the hyperlink structure which represents an organising principle based on the human facility to be able to discriminate between...
Paolo Massa, Conor Hayes
SAC
2005
ACM
14 years 2 months ago
A trust-enhanced recommender system application: Moleskiing
Recommender Systems (RS) suggests to users items they will like based on their past opinions. Collaborative Filtering (CF) is the most used technique to assess user similarity bet...
Paolo Avesani, Paolo Massa, Roberto Tiella

Publication
200views
12 years 5 months ago
Learning Tags from Unsegmented Videos of Multiple Human Actions
Providing methods to support semantic interaction with growing volumes of video data is an increasingly important challenge for data mining. To this end, there has been some succes...
Timothy Hospedales, Shaogang Gong, Tao Xiang
TSP
2012
12 years 4 months ago
Distributed Covariance Estimation in Gaussian Graphical Models
—We consider distributed estimation of the inverse covariance matrix in Gaussian graphical models. These models factorize the multivariate distribution and allow for efficient d...
Ami Wiesel, Alfred O. Hero