Sciweavers

2399 search results - page 131 / 480
» On Authentication between Human and Computer
Sort
View
CISIS
2009
IEEE
15 years 11 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
ACSAC
2002
IEEE
15 years 9 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
HRI
2006
ACM
15 years 10 months ago
The effect of head-nod recognition in human-robot conversation
This paper reports on a study of human participants with a robot designed to participate in a collaborative conversation with a human. The purpose of the study was to investigate ...
Candace L. Sidner, Christopher Lee, Louis-Philippe...
ICPR
2006
IEEE
16 years 5 months ago
Evaluating Hierarchical Graph-based Segmentation
Using real world images, two hierarchical graph-based segmentation methods are evaluated with respect to segmentations produced by humans. Global and local consistency measures do...
Yll Haxhimusa, Adrian Ion, Walter G. Kropatsch
HRI
2010
ACM
15 years 11 months ago
Selecting and commanding individual robots in a vision-based multi-robot system
—This video presents a computer vision based system for interaction between a single human and multiple robots. Face contact and motion-based gestures are used as two different n...
Alex Couture-Beil, Richard T. Vaughan, Greg Mori