Sciweavers

16160 search results - page 84 / 3232
» How to approach humans
Sort
View
SIGITE
2004
ACM
14 years 1 months ago
How information technology professionals keep from being outsourced or offshored
This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...
Ron Fulbright, Richard L. Routh
BMVC
2010
13 years 3 months ago
"How old are you?" : Age Estimation with Tensors of Binary Gaussian Receptive Maps
In this paper we describe experiments with a method to automatically estimate human age from facial images. This system extends recent results with the use of a tensorial represen...
John A. Ruiz-Hernandez, James L. Crowley, Augustin...
CCS
2006
ACM
13 years 11 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
HIP
2005
Springer
172views Cryptology» more  HIP 2005»
14 years 1 months ago
Building Segmentation Based Human-Friendly Human Interaction Proofs (HIPs)
Human interaction proofs (HIPs) have become common place on the internet due to their effectiveness in deterring automated abuse of online services intended for humans. However, th...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...
CHI
2009
ACM
14 years 8 months ago
Focus on driving: how cognitive constraints shape the adaptation of strategy when dialing while driving
We investigate how people adapt their strategy for interleaving multiple concurrent tasks to varying objectives. A study was conducted in which participants drove a simulated vehi...
Duncan P. Brumby, Dario D. Salvucci, Andrew Howes