Sciweavers

1531 search results - page 133 / 307
» Data collection by the people, for the people
Sort
View
MM
1999
ACM
176views Multimedia» more  MM 1999»
15 years 5 months ago
Modeling focus of attention for meeting indexing
—A user’s focus of attention plays an important role in human–computer interaction applications, such as a ubiquitous computing environment and intelligent space, where the u...
Rainer Stiefelhagen, Jie Yang, Alex Waibel
ACSAC
1998
IEEE
15 years 5 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
DPPI
2007
ACM
15 years 5 months ago
My agent as myself or another: effects on credibility and listening to advice
Abstract. People consider other people who resemble them to be more persuasive. Users may consider embodied conversational agents, or ECAs, to be more persuasive if the agents rese...
Ian Li, Jodi Forlizzi, Anind K. Dey, Sara B. Kiesl...
ECRIME
2007
15 years 5 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
FGR
2004
IEEE
136views Biometrics» more  FGR 2004»
15 years 5 months ago
Advances in Automatic Gait Recognition
Automatic recognition by gait is subject to increasing interest and has the unique capability to recognize people at a distance when other biometrics are obscured. Its interest is...
Mark S. Nixon, John N. Carter