Sciweavers

2497 search results - page 495 / 500
» Image mining by content
Sort
View
USS
2008
14 years 4 days ago
Digital Objects as Passwords
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of gener...
Mohammad Mannan, Paul C. van Oorschot
DAGSTUHL
2006
13 years 11 months ago
Are we Ready to Embrace the Semantic Web?
action from low level features to high level semantics. Owing to the proliferation of multimedia content in the internet, there is widespread interest in the semantic web community...
Shankar Vembu, Stephan Baumann
ECSCW
2003
13 years 11 months ago
When Can I Expect an Email Response? A Study of Rhythms in Email Usage
A study of email responsiveness was conducted to understand how the timing of email responses conveys important information. Interviews and observations explored users’ perceptio...
Joshua R. Tyler, John C. Tang
NIPS
2004
13 years 11 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
VCIP
2003
126views Communications» more  VCIP 2003»
13 years 11 months ago
Media handling for visual information retrieval in VizIR
This paper describes how the handling of visual media objects is implemented in the visual information retrieval project VizIR. Essentially, four areas are concerned: media access...
Horst Eidenberger