Sciweavers

2604 search results - page 373 / 521
» Human Errors and System Requirements
Sort
View
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
14 years 3 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
ECCV
2010
Springer
13 years 11 months ago
Emotion Recognition from Arbitrary View Facial Images
Abstract. Emotion recognition from facial images is a very active research topic in human computer interaction (HCI). However, most of the previous approaches only focus on the fro...
PAKDD
2010
ACM
165views Data Mining» more  PAKDD 2010»
13 years 11 months ago
Classification and Novel Class Detection in Data Streams with Active Mining
We present ActMiner, which addresses four major challenges to data stream classification, namely, infinite length, concept-drift, conceptevolution, and limited labeled data. Most o...
Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei ...
TRECVID
2008
13 years 10 months ago
University of Sheffield at TRECVID 2008: Rushes Summarisation and Video Copy Detection
This paper presents our experiments on TRECVID workshop 2008. This year we participated in two challenging tasks, rushes video summarisation and video copy detection tasks. We stu...
Siripinyo Chantamunee, Yoshihiko Gotoh
BMCBI
2010
227views more  BMCBI 2010»
13 years 9 months ago
Accurate and efficient gp120 V3 loop structure based models for the determination of HIV-1 co-receptor usage
Background: HIV-1 targets human cells expressing both the CD4 receptor, which binds the viral envelope glycoprotein gp120, as well as either the CCR5 (R5) or CXCR4 (X4) co-recepto...
Majid Masso, Iosif I. Vaisman