Users often do not install security-related software updates, leaving their devices open to exploitation by attackers. We are beginning to understand what factors affect this software updating behavior but the questio...
This paper presents a lightweight algorithm for feature extraction, classification of seven different emotions, and facial expression recognition in a real-time manner based on static images of the human face. In this...
详细信息
Since its release, Kinect has been the de facto standard for low-cost RGB-D sensors. An infrared laser ray shot through an holographic diffraction grating projects a fixed dot pattern which is captured using an infrar...
详细信息
ISBN:
(纸本)9781479957521
Since its release, Kinect has been the de facto standard for low-cost RGB-D sensors. An infrared laser ray shot through an holographic diffraction grating projects a fixed dot pattern which is captured using an infrared camera. The pseudo-random pattern ensures that a simple block matching algorithm suffices to provide reliable depth estimates, allowing a cost-effective implementation. In this paper, we analyze the software limitations of Kinect's method, which allows us to propose algorithms that provide better precision. First, we analyze the dot pattern: we measure its pincushion distortion and its effect on the dot density, which is smaller towards the edges of the image. Then, we analyze the behavior of Block Matching algorithms, we show how Kinect's Block Matching implementation is;in general;limited by the dot density of the pattern, and a significant spatial bias is introduced as a result. We propose an efficient approach to estimate the disparity of each dot, allowing us to produce a point cloud with better spatial resolution than Block Matching algorithms.
As smart homes become more prevalent in daily life, the ability to understand dynamic environments is essential which is increasingly dependent on AI systems. This study focuses on developing an intelligent algorithm ...
详细信息
The lack of reliable, personalized information often complicates sexual violence survivors' support-seeking. Recently, there is an emerging approach to conversational information systems for support-seeking of sex...
详细信息
Visual Simultaneous Localization and Mapping (vSLAM) is a cornerstone technology in computervision and robotics, underpinning applications such as autonomous vehicles and robot navigation. While traditional vSLAM sys...
详细信息
In this paper we describe SINQ, a prototype web application that utilizes social participation to guide learners through the scientific inquiry process. The paper outlines the challenges associated with scientific inq...
详细信息
Over time, many people accumulate extensive email repositories that contain detailed information about their personal communication patterns and relationships. We present three visualizations that capture hierarchical...
详细信息
ISBN:
(纸本)1595933530
Over time, many people accumulate extensive email repositories that contain detailed information about their personal communication patterns and relationships. We present three visualizations that capture hierarchical, correlational, and temporal patterns present in user's email repositories. These patterns are difficult to discover using traditional interfaces and are valuable for navigation and reflection on social relationships and communication history. We interviewed users with diverse email habits and found that they were able to interpret these images and could find interesting features that were not evident to them through their standard email interfaces. The images also capture a wide range of variation in email practices. These results suggest that information visualizations of personal communications have value for end-users and analysts alike. Copyright 2006 ACM.
The microblogging service Twitter has become an important, and sometimes primary, source of information for many users. As a forum for sharing news and discussing events, it can provide instant access to the latest up...
详细信息
ISBN:
(纸本)9781450310154
The microblogging service Twitter has become an important, and sometimes primary, source of information for many users. As a forum for sharing news and discussing events, it can provide instant access to the latest updates, but this is not always welcome. In the case of television shows or live sporting events, for example, tweets about them may reveal spoilers to users in different time zones or who are delaying their viewing until later. More broadly, because Twitter is a broadcast medium, users may often want to temporarily or permanently hide content about a very specific given topic. In this paper, we describe the unique challenges to HCI, social computing, and computational linguistics posed by the task of building an interface that blocks all tweets about a specific event or topic. We illustrate some of the challenges through a pilot experiment run for three major television events: the 2009 NFC Championship football game, the 2010 mid-season finale of the show Glee, and the 2010 season premiere of the show 24. While simple techniques achieve very high recall (> 98%), spoilers still make it through the filter and precision is extremely poor. We conclude with a description of challenges to the community in implementing this new and increasingly important feature. Copyright 2012 ACM.
Pulitzer Prize-winning journalist Nicholas Kristof argues that "in this century the paramount moral challenge will be the struggle for gender equality around the world." In this paper, we present a design mo...
详细信息
ISBN:
(纸本)9781450302289
Pulitzer Prize-winning journalist Nicholas Kristof argues that "in this century the paramount moral challenge will be the struggle for gender equality around the world." In this paper, we present a design model for empowering low-income women in the developing world, in ways that cut across individual application areas. Specifically, this model characterizes a possible trajectory for NGOs and women to engage with each other and among themselves - potentially augmented by technology - to help women escape from poverty. The fieldwork components in this study took place over 15 weeks in three phases, with a total of 47 NGO staff members and 35 socio-economically challenged women in rural and urban India. Interviews and co-design sessions with seven proof-of-concept prototypes showed that women appeared to belong to five distinct stages of "growth" in striving towards independence. We report the technology design lessons from our co-design sessions to illustrate how user readiness, relationship building at the community and family levels, and integration with state, national and international level programs, should be taken into account in the broader context of intervention design. Copyright 2011 ACM.
暂无评论