Sciweavers

4004 search results - page 75 / 801
» How Many Packets Can We Encode
Sort
View
CVPR
2010
IEEE
15 years 10 months ago
Face Recognition with Learning-based Descriptor
We present a novel approach to address the representation issue and the matching issue in face recognition (verification). Firstly, our approach encodes the micro-structures of t...
Zhimin Cao, Qi Yin, Jian Sun, Xiaoou Tang
GROUP
2007
ACM
15 years 6 months ago
Privacy in the open: how attention mediates awareness and privacy in open-plan offices
The tension between privacy and awareness has been a persistent difficulty in distributed environments that support opportunistic and informal interaction. For example, many aware...
Jeremy P. Birnholtz, Carl Gutwin, Kirstie Hawkey
AAAI
2011
14 years 2 months ago
Recognizing Plans with Loops Represented in a Lexicalized Grammar
This paper extends existing plan recognition research to handle plans containing loops. We supply an encoding of plans with loops for recognition, based on techniques used to pars...
Christopher W. Geib, Robert P. Goldman
115
Voted
ESORICS
2009
Springer
15 years 9 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
GROUP
2003
ACM
15 years 7 months ago
How people use orientation on tables: comprehension, coordination and communication
In order to support co-located collaboration, many researchers are now investigating how to effectively augment tabletops with electronic displays. As far back as 1988, orientatio...
Russell Kruger, M. Sheelagh T. Carpendale, Stacey ...