Sciweavers

592 search results - page 64 / 119
» Learning of personalized security settings
Sort
View
CHI
2007
ACM
14 years 8 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
LCTRTS
2007
Springer
14 years 1 months ago
Integrated CPU and l2 cache voltage scaling using machine learning
Embedded systems serve an emerging and diverse set of applications. As a result, more computational and storage capabilities are added to accommodate ever more demanding applicati...
Nevine AbouGhazaleh, Alexandre Ferreira, Cosmin Ru...
ICPR
2000
IEEE
14 years 9 months ago
Visual Extraction of Motion-Based Information from Image Sequences
We describe a system which is designed to assist in extracting high-level information from sets or sequences of images. We show that the method of principal components analysis fo...
David P. Gibson, Neill W. Campbell, Colin J. Dalto...
DAGM
2009
Springer
14 years 2 months ago
Face Reconstruction from Skull Shapes and Physical Attributes
Reconstructing a person’s face from its skeletal remains is a task that has over many decades fascinated artist and scientist alike. In this paper we treat facial reconstruction ...
Pascal Paysan, Marcel Lüthi, Thomas Albrecht,...
PPSN
2004
Springer
14 years 1 months ago
The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling
Two ideas taken from Bayesian optimization and classifier systems are presented for personnel scheduling based on choosing a suitable scheduling rule from a set for each person’s...
Jingpeng Li, Uwe Aickelin