Sciweavers

1800 search results - page 302 / 360
» Learning Restart Strategies
Sort
View
CHI
2010
ACM
14 years 6 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
CVPR
2009
IEEE
14 years 6 months ago
Automatic facial landmark labeling with minimal supervision
Landmark labeling of training images is essential for many learning tasks in computer vision, such as object detection, tracking, and alignment. Image labeling is typically conduc...
Yan Tong, Xiaoming Liu 0002, Frederick W. Wheeler,...
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 6 months ago
Approximate Dynamic Programming in Knowledge Discovery for Rapid Response
One knowledge discovery problem in the rapid response setting is the cost of learning which patterns are indicative of a threat. This typically involves a detailed follow-through,...
Peter Frazier, Warren B. Powell, Savas Dayanik, Pa...
TEI
2009
ACM
117views Hardware» more  TEI 2009»
14 years 6 months ago
Easigami: a reconfigurable folded-sheet TUI
Easigami is a novel tangible user interface (TUI) and interactive system intended to help children to learn to fold 3D geometric forms and to explore 2D-3D transformations. We pre...
Yingdan Huang, Mark D. Gross, Ellen Yi-Luen Do, Mi...
ESSOS
2009
Springer
14 years 6 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely