Sciweavers

357 search results - page 68 / 72
» Learning an Information Theoretic Transform for Object Detec...
Sort
View
CCS
2010
ACM
13 years 7 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
ITICSE
2004
ACM
14 years 27 days ago
Using interactive technology in a short java course: an experience report
Keeping students alert and responsive during lectures is a challenge even for experienced teachers in small group settings. Research has shown the importance of student participat...
Roberto E. Lopez-Herrejon, Morrie Schulman
IJON
1998
172views more  IJON 1998»
13 years 7 months ago
Blind separation of convolved mixtures in the frequency domain
In this paper we employ information theoretic algorithms, previously used for separating instantaneous mixtures of sources, for separating convolved mixtures in the frequency doma...
Paris Smaragdis
UIST
2004
ACM
14 years 27 days ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
SAICSIT
2010
ACM
13 years 5 months ago
Determining requirements within an indigenous knowledge system of African rural communities
Eliciting and analyzing requirements within knowledge systems, which fundamentally differ so far from technology supported systems represent particular challenges. African rural c...
Heike Winschiers-Theophilus, Nicola J. Bidwell, Sh...