Sciweavers

3895 search results - page 657 / 779
» Measuring the effectiveness of ACATS
Sort
View
ICPR
2010
IEEE
15 years 11 months ago
Boosting Gray Codes for Red Eyes Removal
Since the large diffusion of digital camera and mobile devices with embedded camera and flashgun, the red-eyes artifacts have de-facto become a critical problem. The technique he...
Sebastiano Battiato, Giovanni Maria Farinella, Mir...
WWW
2010
ACM
15 years 11 months ago
Sampling high-quality clicks from noisy click data
Click data captures many users’ document preferences for a query and has been shown to help significantly improve search engine ranking. However, most click data is noisy and of...
Adish Singla, Ryen W. White
ETRA
2010
ACM
169views Biometrics» more  ETRA 2010»
15 years 11 months ago
Eye and pointer coordination in search and selection tasks
Selecting a graphical item by pointing with a computer mouse is a ubiquitous task in many graphical user interfaces. Several techniques have been suggested to facilitate this task...
Hans-Joachim Bieg, Lewis L. Chuang, Roland W. Flem...
TEI
2010
ACM
114views Hardware» more  TEI 2010»
15 years 11 months ago
valeo: alienation gesture-enhanced tactile pain logging
In current healthcare research, pain logs are an important means to measure the impact of medication and to detect pain patterns. However, the entry of textual pain data may be ne...
Matthias Löwe, Omer Yosha, Alexander Krause, ...
ACSAC
2009
IEEE
15 years 11 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...