Sciweavers

1737 search results - page 316 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CHI
2004
ACM
14 years 9 months ago
A commonsense approach to predictive text entry
People cannot type as fast as they think, especially when faced with the constraints of mobile devices. There have been numerous approaches to solving this problem, including rese...
Tom Stocky, Alexander Faaborg, Henry Lieberman
PDIS
1994
IEEE
14 years 1 months ago
Distributed Selective Dissemination of Information
To help users cope with information overload, Selective Dissemination of Information SDI will increasingly become an important tool in wide area information systems. In an SDI ser...
Tak W. Yan, Hector Garcia-Molina
ESANN
2004
13 years 10 months ago
Data Mining Techniques on the Evaluation of Wireless Churn
This work focuses on one of the most critical issues to plague the wireless telecommunications industry today: the loss of a valuable subscriber to a competitor, also defined as ch...
Jorge Ferreira, Marley B. R. Vellasco, Marco Aur&e...
ICCV
2007
IEEE
15 years 4 months ago
 A Component Based Deformable Model for Generalized Face Alignment
This paper presents a component based deformable model for generalized face alignment, in which a novel bistage statistical framework is proposed to account for both local and g...
Yuchi Huang, Qingshan Liu, Dimitris Metaxas
PAMI
2012
11 years 11 months ago
Exploring Context and Content Links in Social Media: A Latent Space Method
—Social media networks contain both content and context-specific information. Most existing methods work with either of the two for the purpose of multimedia mining and retrieva...
Guo-Jun Qi, Charu C. Aggarwal, Qi Tian, Heng Ji, T...