Sciweavers

48 search results - page 6 / 10
» How Well Can People Use Different Color Attributes
Sort
View
CVPR
2006
IEEE
14 years 9 months ago
Gesture Recognition using Hidden Markov Models from Fragmented Observations
We consider the problem of computing the likelihood of a gesture from regular, unaided video sequences, without relying on perfect segmentation of the scene. Instead of requiring ...
Ruiduo Yang, Sudeep Sarkar
INFOCOM
2012
IEEE
11 years 10 months ago
Estimating age privacy leakage in online social networks
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
ESAW
2000
Springer
13 years 11 months ago
Models of Coordination
While software is becoming decomposed in more and more finegrained entities, the interactions amongst those become of major importance. While methodologies for building such compon...
Robert Tolksdorf
W4A
2005
ACM
14 years 1 months ago
What's the web like if you can't see it?
Awareness of Web accessibility is spreading all over the world among Web designers and developers, due to regulations such as the US law called Section 508 and guidelines like the...
Chieko Asakawa
ICDE
2009
IEEE
160views Database» more  ICDE 2009»
13 years 5 months ago
Perm: Processing Provenance and Data on the Same Data Model through Query Rewriting
Data provenance is information that describes how a given data item was produced. The provenance includes source and intermediate data as well as the transformations involved in pr...
Boris Glavic, Gustavo Alonso