Sciweavers

233 search results - page 45 / 47
» The Author-Topic Model for Authors and Documents
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
13 years 11 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
CHI
2005
ACM
14 years 10 months ago
A study on the manipulation of 2D objects in a projector/camera-based augmented reality environment
Are the object manipulation techniques traditionally used in head?mounted displays (HMDs) applicable to augmented reality based projection systems? This paper examines the differe...
Stephen Voida, Mark Podlaseck, Rick Kjeldsen, Clau...
CHI
2005
ACM
14 years 10 months ago
WebGazeAnalyzer: a system for capturing and analyzing web reading behavior using eye gaze
Capturing and analyzing the detailed eye movements of a user while reading a web page can reveal much about the ways in which web reading occurs. The WebGazeAnalyzer system descri...
David Beymer, Daniel M. Russell
IUI
2010
ACM
14 years 6 months ago
Haptic augmented reality dental trainer with automatic performance assessment
We developed an augmented reality (AR) dental training simulator utilizing a haptic (force feedback) device. A number of dental procedures such as crown preparation and opening ac...
Phattanapon Rhienmora, Kugamoorthy Gajananan, Pete...