Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
9
views
49
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,292
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computational Science – ICCS 2005
A Review of the Gaps and Opportunities of Nudity and Skin Detection Algorithmic Research for the Purpose of Combating Adolescent Sexting Behaviors
other
Author(s):
Muhammad Uzair Tariq
,
Afsaneh Razi
,
Karla Badillo-Urquiola
,
Pamela Wisniewski
Publication date
(Online):
June 27 2019
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Karger: Dermatology
Most cited references
49
Record
: found
Abstract
: not found
Article
: not found
Sexting: A new, digital vehicle for intimate partner aggression?
Michelle Drouin
,
Jody Ross
,
Elizabeth Tobin
(2015)
0
comments
Cited
73
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Balancing Participation and Risks in Children's Internet Use: The Role of Internet Literacy and Parental Mediation
Young-Gil Chae
,
Sook-Jung Lee
(2012)
0
comments
Cited
22
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Toward human-centered algorithm design
Eric PS Baumer
(2017)
0
comments
Cited
15
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2019
Publication date (Online):
June 27 2019
Pages
: 90-108
DOI:
10.1007/978-3-030-22636-7_6
SO-VID:
7127172a-2bed-47c5-afef-427964b41261
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Semantic Interoperation Among Data Systems at a Communication Level
pp. 19
Augmenting LOD-Based Recommender Systems Using Graph Centrality Measures
pp. 2
How to Enhance a Superscalar Processor to Provide Hard Real-Time Capable In-Order SMT
pp. 3
Learning to Use the Openbox: A Framework for the Implementation of Heterogeneous Reasoning
pp. 44
Investigating the Role of Goal Orientation: Metacognitive and Cognitive Strategy Use and Learning with Intelligent Tutoring Systems
pp. 55
A Hidden Astroturfing Detection Approach Base on Emotion Analysis
pp. 73
Towards an Evolutionary Formal Software-Development Using CASL
pp. 109
The Petri Net Kernel
pp. 149
New Approaches to Traitor Tracing with Embedded Identities
pp. 78
A Metamodel for Agents, Roles, and Groups
pp. 90
A Review of the Gaps and Opportunities of Nudity and Skin Detection Algorithmic Research for the Purpose of Combating Adolescent Sexting Behaviors
pp. 138
Qualitative risk assessment fulfils a need
pp. 66
An Efficient Method of Vehicle License Plate Detection Based on HSI Color Model and Histogram
pp. 84
An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing
pp. 99
A Tool-Assisted Framework for Certified Bytecode Verification
pp. 86
The B tool (Abstract)
pp. 129
Siloed Federated Learning for Multi-centric Histopathology Datasets
pp. 217
Large FHE Gates from Tensored Homomorphic Accumulator
pp. 181
Knuth-bendix completion of horn clause programs for restricted linear resolution and paramodulation
pp. 237
A formal description of object-oriented programming using VDM
pp. 260
VDM proof obligations and their justification
pp. 370
What Is in a Step: New Perspectives on a Classical Question
pp. 196
Towards Illumination Invariance in the Legged League
pp. 218
A Deontic Logic for Socially Optimal Norms
pp. 339
The Kiv-approach to software verification
pp. 180
EMD-TEO Based Speech Emotion Recognition
pp. 288
Malware Triage Based on Static Features and Public APT Reports
pp. 317
A Survey of Agent-Oriented Methodologies
pp. 335
Mobile Haskell: Compiling lazy functional programs for the Java Virtual Machine
pp. 404
Model Driven Provisioning: Bridging the Gap Between Declarative Object Models and Procedural Provisioning Tools
pp. 284
Reuse of proofs in software verification
pp. 476
P3S: A Privacy Preserving Publish-Subscribe Middleware
pp. 231
The Barwise-Seligman Model of Representation Systems: A Philosophical Explication
pp. 264
Vision Sensors on the Webots Simulator
pp. 319
Compiling concurrent rewriting onto the Rewrite Rule Machine
pp. 223
Implementing MPI with the Memory-Based Communication Facilities on the SSS-CORE operating system
pp. 363
Parallel Materialization of Datalog Programs with Spark for Scalable Reasoning
pp. 490
Detection and optimization of functional computations in Prolog
pp. 495
Semantic Segmentation for Prohibited Items in Baggage Inspection
pp. 357
A Classification Method of Darknet Traffic for Advanced Security Monitoring and Response
pp. 578
UNED at ImageCLEF 2005: Automatically Structured Queries with Named Entities over Metadata
pp. 624
Towards Dynamically Adaptive Weather Analysis and Forecasting in LEAD
Similar content
1,292
Bare Bodies: Nudity, Gender, and the Looking Glass Body.
Authors:
Martin Weinberg
,
Colin Williams
Empire of ecstasy: Nudity and movement in German body culture
Authors:
K Toepfer
Nudities. Trans. David Kishik and Stefan Pedatella
Authors:
G. AGAMBEN
See all similar
Cited by
1
Getting Meta: A Multimodal Approach for Detecting Unsafe Conversations within Instagram Direct Messages of Youth
Authors:
Shiza Ali
,
Afsaneh Razi
,
Seunghyun Kim
…
See all cited by