Sciweavers

2846 search results - page 45 / 570
» Not one click for security
Sort
View
ICCV
2009
IEEE
16 years 9 months ago
Beyond Connecting the Dots: A Polynomial-time Algorithm for Segmentation and Boundary Estimation with Imprecise User Input
We propose a polynomial-time algorithm for segmentation and (open) boundary estimation which takes into account a series of user-specified attraction points. In contrast to exis...
Thomas Windheuser, Thomas Schoenemann, Daniel Crem...
167
Voted
ICCV
2001
IEEE
16 years 6 months ago
Cloning Your Own Face with a Desktop Camera
: We have developed an easy and cost-effective system that constructs textured 3D animated face models from videos with minimal user interaction. Our system first takes, with an or...
Zhengyou Zhang, Zicheng Liu, Dennis Adler, Michael...
WWW
2008
ACM
16 years 4 months ago
User behavior oriented web spam detection
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru
KDD
2008
ACM
166views Data Mining» more  KDD 2008»
16 years 4 months ago
Generating succinct titles for web URLs
How can a search engine automatically provide the best and most appropriate title for a result URL (link-title) so that users will be persuaded to click on the URL? We consider th...
Deepayan Chakrabarti, Ravi Kumar, Kunal Punera
CHI
2008
ACM
16 years 4 months ago
Generalized selection via interactive query relaxation
Selection is a fundamental task in interactive applications, typically performed by clicking or lassoing items of interest. However, users may require more nuanced forms of select...
Jeffrey Heer, Maneesh Agrawala, Wesley Willett