Sciweavers

2564 search results - page 240 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
108
Voted
CHI
2007
ACM
16 years 3 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
171
Voted
EUROCAST
1997
Springer
156views Hardware» more  EUROCAST 1997»
15 years 7 months ago
A Computational Model for Visual Size, Location and Movement
The ability to detect object size, location and movement is essential for a visual system in either a biological or man made environment. In this paper we present a model for esti...
Miguel Alemán-Flores, K. Nicholas Leibovic,...
126
Voted
SI3D
1999
ACM
15 years 7 months ago
Interactive technical illustration
A rendering is an abstraction that favors, preserves, or even emphasizes some qualities while sacrificing, suppressing, or omitting other characteristics that are not the focus o...
Bruce Gooch, Peter-Pike J. Sloan, Amy Gooch, Peter...
113
Voted
CHI
2007
ACM
16 years 3 months ago
Expressing emotion in text-based communication
Our ability to express and accurately assess emotional states is central to human life. The present study examines how people express and detect emotions during text-based communi...
Jeffrey T. Hancock, Christopher Landrigan, Courtne...
145
Voted
ACMACE
2007
ACM
15 years 7 months ago
Gaze-based infotainment agents
We propose an infotainment presentation system that relies on eye gaze as an intuitive and unobtrusive input modality. The system analyzes eye movements in real-time to infer user...
Helmut Prendinger, Tobias Eichner, Elisabeth Andr&...