Sciweavers

4018 search results - page 734 / 804
» Biometrics
Sort
View
DAC
2003
ACM
16 years 25 days ago
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
CHI
2009
ACM
16 years 14 days ago
An fNIR based BMI for letter construction using continuous control
A long term goal of assistive technology research is to build creative expression applications where subjects can extemporaneously express themselves. Sketch drawing is one form o...
Rudolph L. Mappus IV, Girish R. Venkatesh, Chetna ...
DCC
2005
IEEE
15 years 11 months ago
A Point-Set Compression Heuristic for Fiber-Based Certificates of Authenticity
A certificate of authenticity (COA) is an inexpensive physical object that has a random unique structure with high cost of near-exact reproduction. An additional requirement is th...
Darko Kirovski
ETRA
2010
ACM
169views Biometrics» more  ETRA 2010»
15 years 6 months ago
Eye and pointer coordination in search and selection tasks
Selecting a graphical item by pointing with a computer mouse is a ubiquitous task in many graphical user interfaces. Several techniques have been suggested to facilitate this task...
Hans-Joachim Bieg, Lewis L. Chuang, Roland W. Flem...
ETRA
2010
ACM
176views Biometrics» more  ETRA 2010»
15 years 6 months ago
Learning relevant eye movement feature spaces across users
In this paper we predict the relevance of images based on a lowdimensional feature space found using several users’ eye movements. Each user is given an image-based search task,...
Zakria Hussain, Kitsuchart Pasupa, John Shawe-Tayl...