Sciweavers

357 search results - page 68 / 72
» Learning an Information Theoretic Transform for Object Detec...
Sort
View
149
Voted
CCS
2010
ACM
15 years 3 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
116
Voted
ITICSE
2004
ACM
15 years 9 months ago
Using interactive technology in a short java course: an experience report
Keeping students alert and responsive during lectures is a challenge even for experienced teachers in small group settings. Research has shown the importance of student participat...
Roberto E. Lopez-Herrejon, Morrie Schulman
142
Voted
IJON
1998
172views more  IJON 1998»
15 years 3 months ago
Blind separation of convolved mixtures in the frequency domain
In this paper we employ information theoretic algorithms, previously used for separating instantaneous mixtures of sources, for separating convolved mixtures in the frequency doma...
Paris Smaragdis
141
Voted
UIST
2004
ACM
15 years 9 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
150
Voted
SAICSIT
2010
ACM
15 years 1 months ago
Determining requirements within an indigenous knowledge system of African rural communities
Eliciting and analyzing requirements within knowledge systems, which fundamentally differ so far from technology supported systems represent particular challenges. African rural c...
Heike Winschiers-Theophilus, Nicola J. Bidwell, Sh...