Sciweavers

5275 search results - page 175 / 1055
» Computing by observing
Sort
View
CHI
2010
ACM
15 years 10 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
132
Voted
ACHI
2009
IEEE
15 years 10 months ago
Knowledge Reuse through Categorical Breakdown Analysis: A Method for Collaborative Systems Evaluation
Designing CSCW systems that support the widely varying needs of targeted users is difficult. There is no silver bullet technology that enables users to effectively collaborate wit...
Will Humphries, D. Scott McCrickard, Dennis C. Nea...
BROADNETS
2007
IEEE
15 years 10 months ago
Designing a rate-based transport protocol for wired-wireless networks
—A large majority of the Internet traffic relies on TCP as its transport protocol. In future, as the edge of the Internet continues to extend over the wireless medium, TCP (or i...
Shravan Gaonkar, Romit Roy Choudhury, Luiz Magalha...
107
Voted
ISVC
2007
Springer
15 years 10 months ago
Blur in Human Vision and Increased Visual Realism in Virtual Environments
Abstract. A challenge for virtual reality (VR) applications is to increase the realism of an observer’s visual experience. For this purpose the variation of the blur an observer ...
Michael S. Bittermann, I. Sevil Sariyildiz, Ö...
ICCV
2005
IEEE
15 years 9 months ago
Inference of Non-Overlapping Camera Network Topology by Measuring Statistical Dependence
We present an approach for inferring the topology of a camera network by measuring statistical dependence between observations in different cameras. Two cameras are considered con...
Kinh Tieu, Gerald Dalley, W. Eric L. Grimson