Sciweavers

592 search results - page 89 / 119
» Learning of personalized security settings
Sort
View
CVPR
2011
IEEE
13 years 3 months ago
Hyper-graph Matching via Reweighted Random Walks
Establishing correspondences between two feature sets is a fundamental issue in computer vision, pattern recognition, and machine learning. This problem can be well formulated as g...
Jungmin Lee (Seoul National University), Minsu Cho...
JAISE
2010
182views Algorithms» more  JAISE 2010»
13 years 2 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
FGR
2011
IEEE
354views Biometrics» more  FGR 2011»
12 years 11 months ago
Hierarchical ranking of facial attributes
Abstract— We propose a novel hierarchical structured prediction approach for ranking images of faces based on attributes. We view ranking as a bipartite graph matching problem; l...
Ankur Datta, Rogerio Feris, Daniel A. Vaquero
CSCW
2012
ACM
12 years 3 months ago
Finding a new normal: the role of technology in life disruptions
In recent years, the HCI and CSCW communities have begun to examine the role technology plays in personal, rather than professional settings. Part of this work has begun to addres...
Michael Massimi, Jill P. Dimond, Christopher A. Le...
SIGSOFT
2003
ACM
14 years 8 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler