Sciweavers

2399 search results - page 148 / 480
» On Authentication between Human and Computer
Sort
View
114
Voted
CHI
2010
ACM
15 years 11 months ago
On reconstruction of task context after interruption
Theoretical accounts of task resumption after interruption have almost exclusively argued for resumption as a primarily memory-based process. In contrast, for many task domains, r...
Dario D. Salvucci
136
Voted
SIGGRAPH
1995
ACM
15 years 7 months ago
Realistic modeling for facial animation
A major unsolved problem in computer graphics is the construction and animation of realistic human facial models. Traditionally, facial models have been built painstakingly by man...
Yuencheng Lee, Demetri Terzopoulos, Keith Waters
143
Voted
CHI
2000
ACM
15 years 8 months ago
Instructional interventions in computer-based tutoring: differential impact on learning time and accuracy
We can reliably build “second generation” intelligent computer tutors that are approximately half as effective as human tutors. This paper evaluates two interface enhancements...
Albert T. Corbett, Holly J. Trask
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
15 years 10 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
WICON
2008
15 years 5 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...