Sciweavers

497 search results - page 75 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
HRI
2009
ACM
15 years 11 months ago
Robots in the wild: understanding long-term use
It has long been recognized that novelty effects exist in the interaction with technologies. Despite this recognition, we still know little about the novelty effects associated wi...
Ja-Young Sung, Henrik I. Christensen, Rebecca E. G...
130
Voted
SAFECOMP
2007
Springer
15 years 10 months ago
Modeling and Automatic Failure Analysis of Safety-Critical Systems Using Extended Safecharts
With the rapid progress in science and technology, we find ubiquitous use of safety-critical systems in avionics, consumer electronics, and medical instruments. In such systems, u...
Yean-Ru Chen, Pao-Ann Hsiung, Sao-Jie Chen
CSREASAM
2006
15 years 5 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
ACCV
2009
Springer
15 years 5 months ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan
FTIR
2007
119views more  FTIR 2007»
15 years 4 months ago
Opinion Mining and Sentiment Analysis
An important part of our information-gathering behavior has always been to find out what other people think. With the growing availability and popularity of opinion-rich resource...
Bo Pang, Lillian Lee