Sciweavers

2648 search results - page 67 / 530
» Human Factors In Computer Security
Sort
View
CVPR
2007
IEEE
15 years 12 months ago
Beyond bottom-up: Incorporating task-dependent influences into a computational model of spatial attention
A critical function in both machine vision and biological vision systems is attentional selection of scene regions worthy of further analysis by higher-level processes such as obj...
Robert J. Peters, Laurent Itti
ACSAC
2009
IEEE
15 years 4 months ago
A Study of User-Friendly Hash Comparison Schemes
—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans ...
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassan...
EUROGRAPHICS
2010
Eurographics
15 years 7 months ago
The Virtual Director: a Correlation-Based Online Viewing of Human Motion
Automatic camera control for scenes depicting human motion is an imperative topic in motion capture base animation, computer games, and other animation based fields. This challen...
Jackie Assa, Lior Wolf, Daniel Cohen-Or
FGR
2011
IEEE
201views Biometrics» more  FGR 2011»
14 years 1 months ago
Tangent bundle for human action recognition
— Common human actions are instantly recognizable by people and increasingly machines need to understand this language if they are to engage smoothly with people. Here we introdu...
Yui Man Lui, J. Ross Beveridge
HRI
2009
ACM
15 years 4 months ago
How to approach humans?: strategies for social robots to initiate interaction
This paper proposes a model of approach behavior with which a robot can initiate conversation with people who are walking. We developed the model by learning from the failures in ...
Satoru Satake, Takayuki Kanda, Dylan F. Glas, Mich...