Sciweavers

2399 search results - page 153 / 480
» On Authentication between Human and Computer
Sort
View
CMPB
2010
119views more  CMPB 2010»
15 years 1 months ago
Estimation of coefficients of individual agreement (CIAs) for quantitative and binary data using SAS and R
: The coefficients of individual agreement (CIA's), which are based on the ratio of the intra- and inter-observer disagreement, provide a general approach for evaluating agree...
Yi Pan, Jingjing Gao, Michael Haber, Huiman X. Bar...
CHI
1995
ACM
15 years 7 months ago
Oh what a tangled web we weave: metaphor and mapping in graphical interfaces
The relations among graphical representations, computer functionality, and everyday objects are more complex than terms like “the desktop metaphor” may suggest. While metaphor...
William W. Gaver
AMDO
2008
Springer
15 years 6 months ago
2D Articulated Body Tracking with Self-occultations Handling
Recently many methods for human articulated body tracking were proposed in the literature. These techniques are often computationally intensive and cannot be used for Human-Compute...
Eric Para, Olivier Bernier, Catherine Achard
ISWC
2000
IEEE
15 years 8 months ago
Wearable Key: Device for Personalizing Nearby Environment
This paper describes a system that allows users who obtain a “wearable ID key” to personalize dynamically ubiquitous computers by simply touching them. We call the concept of ...
Nobuyuki Matsushita, Shigeru Tajima, Yuji Ayatsuka...
CVPR
2012
IEEE
13 years 6 months ago
Two-person interaction detection using body-pose features and multiple instance learning
Human activity recognition has potential to impact a wide range of applications from surveillance to human computer interfaces to content based video retrieval. Recently, the rapi...
Kiwon Yun, Jean Honorio, Debaleena Chattopadhyay, ...