Sciweavers

1580 search results - page 5 / 316
» Non-Interference Through Determinism
Sort
View
CCS
2010
ACM
13 years 8 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
WETICE
2002
IEEE
14 years 1 months ago
Determination and Evaluation of Web Accessibility
The Web is the most pervasive collaborative technology in widespread use today; however, access to the web and its many applications cannot be taken for granted. Web accessibility...
Cornelia Boldyreff
HCI
2009
13 years 6 months ago
Supporting Situation Awareness in Demanding Operating Environments through Wearable User Interfaces
The military environment is changing, e.g., the operating environment is becoming more varied and demanding. Due to these challenges, new user interfaces (UIs) are required providi...
Jari Laarni, Juhani Heinilä, Jukka Häkki...
CVPR
2011
IEEE
13 years 3 months ago
Illumination Estimation and Cast Shadow Detection through a Higher-order Graphical Model
In this paper, we propose a novel framework to jointly recover the illumination environment and an estimate of the cast shadows in a scene from a single image, given coarse 3D geo...
Alexandros Panagopoulos, Chaohui Wang, Dimitris Sa...
JAMIA
2010
76views more  JAMIA 2010»
13 years 3 months ago
The inadvertent disclosure of personal health information through peer-to-peer file sharing programs
Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheu...
Khaled El Emam, Emilio Neri, Elizabeth Jonker, Mar...