Sciweavers

2648 search results - page 63 / 530
» Human Factors In Computer Security
Sort
View
ECCV
2006
Springer
15 years 11 months ago
Human Detection Using Oriented Histograms of Flow and Appearance
Detecting humans in films and videos is a challenging problem owing to the motion of the subjects, the camera and the background and to variations in pose, appearance, clothing, il...
Navneet Dalal, Bill Triggs, Cordelia Schmid
ECCV
2004
Springer
15 years 11 months ago
Characterization of Human Faces under Illumination Variations Using Rank, Integrability, and Symmetry Constraints
Photometric stereo algorithms use a Lambertian reflectance model with a varying albedo field and involve the appearances of only one object. This paper extends photometric stereo a...
Shaohua Kevin Zhou, Rama Chellappa, David W. Jacob...
FGR
2004
IEEE
230views Biometrics» more  FGR 2004»
15 years 1 months ago
Tracking Humans using Prior and Learned Representations of Shape and Appearance
Tracking a moving person is challenging because a person's appearance in images changes significantly due to articulation, viewpoint changes, and lighting variation across a ...
Jongwoo Lim, David J. Kriegman
CHI
2005
ACM
15 years 10 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
CHI
2008
ACM
14 years 11 months ago
Sesame: informing user security decisions with system visualization
Non-expert users face a dilemma when making security decisions. Their security often cannot be fully automated for them, yet they generally lack both the motivation and technical ...
Jennifer Stoll, Craig S. Tashman, W. Keith Edwards...