Sciweavers

8655 search results - page 183 / 1731
» Challenges for Trusted Computing
Sort
View
CCS
2008
ACM
15 years 17 days ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
SOUPS
2009
ACM
15 years 5 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
FGR
2011
IEEE
238views Biometrics» more  FGR 2011»
14 years 2 months ago
The first facial expression recognition and analysis challenge
— Automatic Facial Expression Recognition and Analysis, in particular FACS Action Unit (AU) detection and discrete emotion detection, has been an active topic in computer science...
Michel François Valstar, Bihan Jiang, Marc ...
ICMI
2009
Springer
106views Biometrics» more  ICMI 2009»
15 years 5 months ago
Towards adapting fantasy, curiosity and challenge in multimodal dialogue systems for preschoolers
We investigate how fantasy, curiosity and challenge contribute to the user experience in multimodal dialogue computer games for preschool children. For this purpose, an on-line mu...
Theofanis Kannetis, Alexandros Potamianos
MOBICOM
2006
ACM
15 years 4 months ago
Localization in underwater sensor networks: survey and challenges
In underwater sensor networks (UWSNs), determining the location of every sensor is important and the process of estimating the location of each node in a sensor network is known a...
Vijay R. Chandrasekhar, Winston Khoon Guan Seah, Y...