Sciweavers

464 search results - page 57 / 93
» Identity Management
Sort
View
CIKM
2008
Springer
13 years 9 months ago
Leveraging social context for searching social media
The ability to utilize and benefit from today's explosion of social media sites depends on providing tools that allow users to productively participate. In order to participa...
Marc Smith, Vladimir Barash, Lise Getoor, Hady Wir...
ACISICIS
2005
IEEE
13 years 9 months ago
Palmprint Identification Algorithm Using Hu Invariant Moments and Otsu Binarization
Recently, Biometrics-based personal identification is regarded as an effective method of person's identity with recognition automation and high performance. In this paper, th...
Jin Soo Noh, Kang Hyeon Rhee
UAI
2003
13 years 9 months ago
The Information Bottleneck EM Algorithm
Learning with hidden variables is a central challenge in probabilistic graphical models that has important implications for many real-life problems. The classical approach is usin...
Gal Elidan, Nir Friedman
IJMMS
2008
99views more  IJMMS 2008»
13 years 7 months ago
Storied spaces: Cultural accounts of mobility, technology, and environmental knowing
When we think of mobility in technical terms, we think of topics such as bandwidth, resource management, location, and wireless networks. When we think of mobility in social or cu...
Johanna Brewer, Paul Dourish
AMI
2010
Springer
13 years 6 months ago
A Distributed Many-Camera System for Multi-person Tracking
This article presents a modular, distributed and scalable many-camera system designed towards tracking multiple people simultaneously in a natural human-robot interaction scenario ...
Claus Lenz, Thorsten Röder, Martin Eggers, Si...