Sciweavers

766 search results - page 120 / 154
» How to Read a Signature
Sort
View
ICWSM
2009
15 years 1 months ago
Information Cascades in the Blogosphere: A Look Behind the Curtain
With an increasing number of people that read, write and comment on blogs, the blogosphere has established itself as an essential medium of communication. A fundamental characteri...
Manos Papagelis, Nilesh Bansal, Nick Koudas
ICCV
2011
IEEE
14 years 3 months ago
End-to-end Scene Text Recognition
This paper focuses on the problem of word detection and recognition in natural images. The problem is significantly more challenging than reading text in scanned documents, and h...
Kai Wang, Boris Babenko, Serge Belongie
140
Voted
ESORICS
2011
Springer
14 years 3 months ago
Supporting Concurrency in Private Data Outsourcing
Abstract. With outsourcing emerging as a successful paradigm for delegating data and service management to third parties, the problem of guaranteeing proper privacy protection agai...
Sabrina De Capitani di Vimercati, Sara Foresti, St...
120
Voted
SIGUCCS
2005
ACM
15 years 9 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
136
Voted
NORDICHI
2004
ACM
15 years 8 months ago
Adaptivity in speech-based multilingual e-mail client
In speech interfaces users must be aware what can be done with the system – in other words, the system must provide information to help the users to know what to say. We have ad...
Esa-Pekka Salonen, Mikko Hartikainen, Markku Turun...