Sciweavers

485 search results - page 56 / 97
» Authentication by Biometric Verification
Sort
View
ICMI
2009
Springer
94views Biometrics» more  ICMI 2009»
15 years 4 months ago
Modeling culturally authentic style shifting with virtual peers
: We report on a new kind of culturally-authentic embodied conversational agent more in line with the ways that culture and ethnicity function in the real world. On the basis of th...
Justine Cassell, Kathleen Geraghty, Berto Gonzalez...
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
15 years 4 months ago
Support of Case-Based Authentic Learning Activities: A Collaborative Case Commenting Tool and a Collaborative Case Builder
Cases are widely used in professional education to engage learners with examples of real world practices. Collaboration in casebased learning can add to the authenticity of the ex...
Lu Xiao, John M. Carroll, Pat Clemson, Mary Beth R...
APNOMS
2007
Springer
15 years 3 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
AVBPA
2005
Springer
347views Biometrics» more  AVBPA 2005»
15 years 3 months ago
Palmprint Authentication Based on Orientation Code Matching
Abstract. This paper presents a novel approach of palmprint authentication by matching the orientation code. In this approach, each point on a palmprint is assigned a orientation. ...
Xiangqian Wu, Kuanquan Wang, David Zhang
CRV
2006
IEEE
242views Robotics» more  CRV 2006»
15 years 3 months ago
User Authentication based on Face Recognition with Support Vector Machines
The present paper proposes an authentication scheme which relies on face biometrics and one-class Support Vector Machines. The proposed recognition procedures are based on both a ...
Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandr...