Sciweavers

3509 search results - page 4 / 702
» Yours, Mine and Ours
Sort
View
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig

Dataset
764views
13 years 11 months ago
PItowns: Evaluation database for sign detection
Traffic Image database for the evaluation of road signs extraction algorithms. In any publication related to the use of this image database, your are kindly requested to cite the ...
SIGUCCS
2000
ACM
14 years 1 days ago
Creating a Help Center from Scratch: A Recipe for Success
Creating a university Help Center from scratch can be a challenging yet very rewarding experience for an IT professional. Buying computers, building networks, and installing softw...
Patrick McKoen
SISAP
2010
IEEE
132views Data Mining» more  SISAP 2010»
13 years 6 months ago
SHIATSU: annotating your videos the easy way!
In this demonstration we present SHIATSU, an automatic semantic-based video tagging system which relies on shot boundary detection and hierarchical annotation. More in details, in...
Ilaria Bartolini, Corrado Romani
AAAI
2008
13 years 10 months ago
Text Beautifier: An Affective-Text Tool to Tailor Written Text
We have spelling and grammar checking tools available on today's word processors. But what they are missing is a tool that can recommend several possibilities of a given writ...
Fahim Kawsar, Shaikh Mostafa Al Masum, Mitsuru Ish...