Sciweavers

2399 search results - page 141 / 480
» On Authentication between Human and Computer
Sort
View
CCS
2009
ACM
15 years 8 months ago
Multiple password interference in text passwords and click-based graphical passwords
The underlying issues relating to the usability and security of multiple passwords are largely unexplored. However, we know that people generally have difficulty remembering mult...
Sonia Chiasson, Alain Forget, Elizabeth Stobert, P...
CVPR
2007
IEEE
16 years 6 months ago
Transfer Learning in Sign language
We build word models for American Sign Language (ASL) that transfer between different signers and different aspects. This is advantageous because one could use large amounts of la...
Ali Farhadi, David A. Forsyth, Ryan White
HRI
2010
ACM
15 years 8 months ago
From manipulation to communicative gesture
— Assisting humans in their daily lives requires robots to be proficient in manual tasks and effective in communicating states/intentions with human users. This paper advocates ...
Shichao Ou, Roderic A. Grupen
HRI
2010
ACM
15 years 2 months ago
Towards industrial robots with human-like moral responsibilities
—Robots do not have any capability of taking moral responsibility. At the same time industrial robotics is entering a new era with “intelligent” robots sharing workbench with...
Baran Çürüklü, Gordana Dodig...
146
Voted
ACMDIS
2006
ACM
15 years 10 months ago
How do design and evaluation interrelate in HCI research?
Human-Computer Interaction (HCI) is defined by the Association for Computing Machinery (ACM) Special Interest Group on Computer-Human Interaction (SIGCHI) as “a discipline conce...
Christine E. Wania, Michael E. Atwood, Katherine W...