Sciweavers

2564 search results - page 478 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
ACMACE
2006
ACM
14 years 1 months ago
Projecting tension in virtual environments through lighting
Interactive synthetic environments are currently used in a wide variety of applications, including video games, exposure therapy, education, and training. Their success in such do...
Magy Seif El-Nasr
TREC
2008
13 years 9 months ago
TREC 2008 at the University at Buffalo: Legal and Blog Track
In the TREC 2008, the team from the State University of New York at Buffalo participated in the Legal track and the Blog track. For the Legal track, we worked on the interactive s...
Jianqiang Wang, Ying Sun, Omar Mukhtar, Rohini K. ...
CVPR
2007
IEEE
14 years 10 months ago
A Unified Probabilistic Framework for Facial Activity Modeling and Understanding
Facial activities are the most natural and powerful means of human communication. Spontaneous facial activity is characterized by rigid head movements, non-rigid facial muscular m...
Yan Tong, Wenhui Liao, Zheng Xue, Qiang Ji
CSCW
2008
ACM
13 years 9 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
KDD
2005
ACM
117views Data Mining» more  KDD 2005»
14 years 8 months ago
Rule extraction from linear support vector machines
We describe an algorithm for converting linear support vector machines and any other arbitrary hyperplane-based linear classifiers into a set of non-overlapping rules that, unlike...
Glenn Fung, Sathyakama Sandilya, R. Bharat Rao