Sciweavers

26354 search results - page 181 / 5271
» How we refactor, and how we know it
Sort
View
BLISS
2007
IEEE
14 years 5 months ago
Evolving the Face of a Criminal: How to Search a Face Space More Effectively
Witnesses and victims of serious crime are often required to construct a facial composite, a visual likeness of a suspect’s face. The traditional method is for them to select in...
Charlie D. Frowd, Vicki Bruce, Carol Gannon, Mark ...
IEEEARES
2007
IEEE
14 years 5 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
ACMDIS
2006
ACM
14 years 4 months ago
How do design and evaluation interrelate in HCI research?
Human-Computer Interaction (HCI) is defined by the Association for Computing Machinery (ACM) Special Interest Group on Computer-Human Interaction (SIGCHI) as “a discipline conce...
Christine E. Wania, Michael E. Atwood, Katherine W...
MM
2005
ACM
123views Multimedia» more  MM 2005»
14 years 4 months ago
How speech/text alignment benefits web-based learning
This demonstration presents an integrated web-based synchronized scenario for many-to-one cross-media correlations between speech (an EFL, English as Foreign Language, lecture wit...
Sheng-Wei Li, Hao-Tung Lin, Herng-Yow Chen
VRML
2005
ACM
14 years 4 months ago
Visualization across the pond: how a wireless PDA can collaborate with million-polygon datasets via 9, 000km of cable
We present an initial report on using our distributed, collaborative grid enabled visualization environment to link SuperComputing 2004 (Pittsburgh, PA, USA) with the Cardiff Scho...
Ian J. Grimstead, Nick J. Avis, David W. Walker