Sciweavers

2399 search results - page 143 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2010
ACM
15 years 9 months ago
Manual deskterity: an exploration of simultaneous pen + touch direct input
Manual Deskterity is a prototype digital drafting table that supports both pen and touch input. We explore a division of labor between pen and touch that flows from natural human ...
Ken Hinckley, Koji Yatani, Michel Pahud, Nicole Co...
CHI
1999
ACM
15 years 8 months ago
A Better Mythology for System Design
The past decades have seen huge improvements in computer systems but these have proved difficult to translate into comparable improvements in the usability and social integration)...
Jed Harris, D. Austin Henderson Jr.
WWW
2008
ACM
16 years 4 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
NSPW
2003
ACM
15 years 9 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
PR
2008
87views more  PR 2008»
15 years 4 months ago
Two-dimensional Laplacianfaces method for face recognition
In this paper we propose a two-dimensional (2D) Laplacianfaces method for face recognition. The new algorithm is developed based on two techniques, i.e., locality preserved embedd...
Ben Niu, Qiang Yang, Simon Chi-Keung Shiu, Sankar ...