Sciweavers

2399 search results - page 127 / 480
» On Authentication between Human and Computer
Sort
View
CSCW
2010
ACM
16 years 27 days ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
ITICSE
2009
ACM
15 years 10 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
HAPTICS
2005
IEEE
15 years 9 months ago
Getting in Touch with a Cognitive Character
We provide computer-animated characters with haptic interaction, allowing human users to interfere with cognitive characters. Our work presents an interface between control and an...
Torsten Bierz, Peter Dannenmann, Kai Hergenrö...
PPL
2010
97views more  PPL 2010»
15 years 2 months ago
On the Importance of Being Quantum
Game playing is commonly cited in debates concerning human versus machine intelligence, and Chess is often at the center of such debates. However, the role of Chess in delineating...
Selim G. Akl
SOUPS
2010
ACM
15 years 8 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan