Sciweavers

124 search results - page 13 / 25
» Progressive Bridge Identification
Sort
View
VMV
2001
105views Visualization» more  VMV 2001»
13 years 9 months ago
Facial Reconstruction Using Volumetric Data
In this paper we demonstrate computer aided techniques in the area of the reconstruction of facial features from skeletal remains. We outline the desired features of a system for ...
Mark W. Jones
IWMMDBMS
1996
116views more  IWMMDBMS 1996»
13 years 9 months ago
Managing Adaptive Presentation Executions in Distributed Multimedia Database Systems
The paper describes recent progress in research on database system support for executing multimedia presentations. It proposes the general concept of Reactive Playout Management t...
Heiko Thimm, Wolfgang Klas, Jonathan Walpole, Calt...
GIS
2007
ACM
14 years 9 months ago
Where were we: communities for sharing space-time trails
We consider trails to be a document type of growing importance, authored in abundance as locative technologies become embedded in mobile devices carried by billions of humans. As ...
Scott Counts, Marc Smith
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 3 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ISEUD
2009
Springer
14 years 3 months ago
Males' and Females' Script Debugging Strategies
Little research has addressed IT professionals’ script debugging strategies, or considered whether there may be gender differences in these strategies. What strategies do male an...
Valentina Grigoreanu, James Brundage, Eric Bahna, ...