Sciweavers

536 search results - page 97 / 108
» Quality evaluation in information systems outsourcing
Sort
View
USENIX
2007
13 years 9 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
CHI
2010
ACM
13 years 10 months ago
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices ...
Tamara Denning, Alan Borning, Batya Friedman, Bria...
CVPR
2007
IEEE
14 years 9 months ago
3D Pose Estimation Based on Multiple Monocular Cues
In this study we propose an integrated approach to the problem of 3D pose estimation. The main difference to the majority of known methods is the usage of complementary image info...
Björn Barrois, Christian Wöhler
MIR
2010
ACM
232views Multimedia» more  MIR 2010»
14 years 2 months ago
Exploiting external knowledge to improve video retrieval
Most video retrieval systems are multimodal, commonly relying on textual information, low- and high-level semantic features extracted from query visual examples. In this work, we ...
David Vallet, Iván Cantador, Joemon M. Jose
CIKM
2007
Springer
14 years 1 months ago
Expertise drift and query expansion in expert search
Pseudo-relevance feedback, or query expansion, has been shown to improve retrieval performance in the adhoc retrieval task. In such a scenario, a few top-ranked documents are assu...
Craig Macdonald, Iadh Ounis