Sciweavers

12438 search results - page 2215 / 2488
» The Magic of a Number System
Sort
View
MIR
2010
ACM
232views Multimedia» more  MIR 2010»
15 years 11 months ago
Exploiting external knowledge to improve video retrieval
Most video retrieval systems are multimodal, commonly relying on textual information, low- and high-level semantic features extracted from query visual examples. In this work, we ...
David Vallet, Iván Cantador, Joemon M. Jose
CHI
2009
ACM
15 years 11 months ago
O' game, can you feel my frustration?: improving user's gaming experience via stresscam
One of the major challenges of video game design is to have appropriate difficulty levels for users in order to maximize the entertainment value of the game. Game players may lose...
Chang Yun, Dvijesh Shastri, Ioannis Pavlidis, Zhig...
IDTRUST
2009
ACM
15 years 11 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
CC
2009
Springer
106views System Software» more  CC 2009»
15 years 11 months ago
Blind Optimization for Exploiting Hardware Features
Software systems typically exploit only a small fraction of the realizable performance from the underlying microprocessors. While there has been much work on hardware-aware optimiz...
Dan Knights, Todd Mytkowicz, Peter F. Sweeney, Mic...
CCS
2009
ACM
15 years 11 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
« Prev « First page 2215 / 2488 Last » Next »