Sciweavers

2399 search results - page 124 / 480
» On Authentication between Human and Computer
Sort
View
ICAT
2003
IEEE
15 years 9 months ago
Intelligent Wearable Assistance System for Communicating with Interactive Electronic Media
The wearable computer that can understand the context of human life and communicate autonomously with various electronic media in a ubiquitous computing environment would be very ...
Yongho Seo, Jin Choi, Taewoo Han, Hyun Seung Yang
CHI
2002
ACM
16 years 4 months ago
Social net: using patterns of physical proximity over time to infer shared interests
We describe Social Net, a novel interest-matching application that uses patterns of collocation, over time, to infer shared interests between users. Social Net demonstrates new po...
Michael A. Terry, Elizabeth D. Mynatt, Kathy Ryall...
CHI
2010
ACM
15 years 7 months ago
Sawtooth: interactive clarity and aesthetic complexity
Sawtooth (2009) is an artwork integrating performance, sound, and animation. This paper describes the design of Sawtooth, with particular reference to the balances it strikes betw...
Christopher Burns
FOCS
2002
IEEE
15 years 9 months ago
On the (non)Universality of the One-Time Pad
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
Yevgeniy Dodis, Joel Spencer
SACMAT
2003
ACM
15 years 9 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons