Sciweavers

169 search results - page 30 / 34
» Malicious interface design: exploiting the user
Sort
View
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...
MSWIM
2006
ACM
14 years 1 months ago
Performance evaluation of web services invocation over Bluetooth
Mobile devices should allow users to exploit services anytime, without any place restriction and in a transparent way. The Bluetooth technology achieves this feature, by providing...
Vincenzo Auletta, Carlo Blundo, Emiliano De Cristo...
JASIS
2007
101views more  JASIS 2007»
13 years 7 months ago
Mining Web functional dependencies for flexible information access
We present an approach to enhancing information access through web structure mining in contrast to traditional approaches involving usage mining. Specifically, we mine the hardwi...
Saverio Perugini, Naren Ramakrishnan
CHI
2009
ACM
14 years 8 months ago
Amplifying community content creation with mixed initiative information extraction
Although existing work has explored both information extraction and community content creation, most research has focused on them in isolation. In contrast, we see the greatest le...
Raphael Hoffmann, Saleema Amershi, Kayur Patel, Fe...
MM
2005
ACM
111views Multimedia» more  MM 2005»
14 years 1 months ago
A flexible system for creating music while interacting with the computer
Music is a very important part of our lives. People enjoy listening to the music, and many of us find a special pleasure in creating the music. Computers further extended many asp...
Zeljko Obrenovic