Sciweavers

2648 search results - page 324 / 530
» Human Factors In Computer Security
Sort
View
HRI
2009
ACM
15 years 10 months ago
How search and its subtasks scale in N robots
The present study investigates the effect of the number of controlled robots on performance of an urban search and rescue (USAR) task using a realistic simulation. Participants co...
Huadong Wang, Michael Lewis, Prasanna Velagapudi, ...
108
Voted
HRI
2006
ACM
15 years 9 months ago
Effects of head movement on perceptions of humanoid robot behavior
This paper examines human perceptions of humanoid robot behavior, specifically how perception is affected by variations in head tracking behavior under constant gestural behavior....
Emily Wang, Constantine Lignos, Ashish Vatsal, Bri...
151
Voted
HRI
2006
ACM
15 years 9 months ago
Empirical results from using a comfort level device in human-robot interaction studies
This paper describes an extensive analysis of the comfort level data of 7 subjects with respect to 12 robot behaviours as part of a human-robot interaction trial. This includes ro...
Kheng Lee Koay, Kerstin Dautenhahn, Sarah Woods, M...
BMCBI
2011
14 years 10 months ago
Classification of viral zoonosis through receptor pattern analysis
Background: Viral zoonosis, the transmission of a virus from its primary vertebrate reservoir species to humans, requires ubiquitous cellular proteins known as receptor proteins. ...
Se-Eun Bae, Hyeon Seok Son
145
Voted
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 3 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar