Sciweavers

3299 search results - page 642 / 660
» Privacy and Trusted Computing
Sort
View
AAMAS
2012
Springer
12 years 4 months ago
Winner determination in voting trees with incomplete preferences and weighted votes
In multiagent settings where agents have different preferences, preference aggregation can be an important issue. Voting is a general method to aggregate preferences. We consider ...
Jérôme Lang, Maria Silvia Pini, Franc...
CVPR
2012
IEEE
11 years 11 months ago
Discriminately decreasing discriminability with learned image filters
In machine learning and computer vision, input signals are often filtered to increase data discriminability. For example, preprocessing face images with Gabor band-pass filters ...
Jacob Whitehill, Javier R. Movellan
MOBISYS
2009
ACM
14 years 9 months ago
Wifi-reports: improving wireless network selection with collaboration
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access p...
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Da...
CHI
2008
ACM
14 years 9 months ago
The network in the garden: an empirical analysis of social media in rural life
History repeatedly demonstrates that rural communities have unique technological needs. Yet, we know little about how rural communities use modern technologies, so we lack knowled...
Eric Gilbert, Karrie Karahalios, Christian Sandvig
CHI
2006
ACM
14 years 9 months ago
Error correction of voicemail transcripts in SCANMail
Despite its widespread use, voicemail presents numerous usability challenges: People must listen to messages in their entirety, they cannot search by keywords, and audio files do ...
Moira Burke, Brian Amento, Philip L. Isenhour