Sciweavers

2648 search results - page 48 / 530
» Human Factors In Computer Security
Sort
View
SIGCSE
2006
ACM
172views Education» more  SIGCSE 2006»
15 years 3 months ago
Computing in context: integrating an embedded computing project into a course on ethical and societal issues
A hands-on embedded computing project is introduced into an undergraduate social sciences course. In the pilot module, nine student teams created working prototypes, using the tec...
Fred G. Martin, Sarah Kuhn
HRI
2006
ACM
15 years 3 months ago
Analysis of human behavior to a communication robot in an open field
This paper investigates human behavior around an interactive robot at a science museum. To develop a communication robot that works in daily environments, it is important to inves...
Shogo Nabe, Takayuki Kanda, Kazuo Hiraki, Hiroshi ...
IJCINI
2007
112views more  IJCINI 2007»
14 years 9 months ago
Neo-Symbiosis: The Next Stage in the Evolution of Human Information Interaction
The purpose of this paper is to re-address the vision of human-computer symbiosis as originally expressed by J.C.R. Licklider nearly a half-century ago and to argue for the releva...
Douglas Griffith, Frank L. Greitzer
IMSCCS
2006
IEEE
15 years 3 months ago
Frequency Distribution of TATA Box and Extension Sequences on Human Promoters
Background: TATA box is one of the most important transcription factor binding sites. But the exact sequences of TATA box are still not very clear. Results: In this study, we cond...
Wei Shi, Wanlei Zhou
FGR
2002
IEEE
161views Biometrics» more  FGR 2002»
15 years 2 months ago
Baseline Results for the Challenge Problem of Human ID Using Gait Analysis
Identification of people from gait captured on video has become a challenge problem in computer vision. However, there is not a baseline algorithm or standard dataset for measuri...
P. Jonathon Phillips, Patrick Grother, Sudeep Sark...