Sciweavers

2648 search results - page 123 / 530
» Human Factors In Computer Security
Sort
View
166
Voted
HRI
2006
ACM
15 years 11 months ago
How may I serve you?: a robot companion approaching a seated person in a helping context
This paper presents the combined results of two studies that investigated how a robot should best approach and place itself relative to a seated human subject. Two live Human Robo...
Kerstin Dautenhahn, Michael L. Walters, Sarah Wood...
PDC
2004
ACM
15 years 10 months ago
Lost in translation: a critical analysis of actors, artifacts, agendas, and arenas in participatory design
As computer technologies start to permeate the everyday activities of a continuously growing population, social and technical as well as political and legal issues will surface. P...
Rogério De Paula
CHI
2011
ACM
14 years 8 months ago
I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application
There have been many location sharing systems developed over the past two decades, and only recently have they started to be adopted by consumers. In this paper, we present the re...
Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jas...
MM
2006
ACM
157views Multimedia» more  MM 2006»
15 years 11 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
126
Voted
COMPUTER
2010
147views more  COMPUTER 2010»
15 years 5 months ago
Authentication by Biometric Verification
:-Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human b...
Ron Vetter