Sciweavers

2399 search results - page 167 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2010
ACM
15 years 4 months ago
America is like Metamucil: fostering critical and creative thinking about metaphor in political blogs
Blogs are becoming an increasingly important medium-socially, academically, and politically. Much research has involved analyzing blogs, but less work has considered how such anal...
Eric P. S. Baumer, Jordan Sinclair, Bill Tomlinson
CHI
2004
ACM
16 years 4 months ago
Safety-critical interaction: usability in incidents and accidents
Recent years have seen an increasing use of sophisticated interaction techniques in the field of command and control systems. The use of such techniques has been required in order...
Philippe A. Palanque, Floor Koornneef, Chris Johns...
HAPTICS
2010
IEEE
15 years 2 months ago
The Influence of Different Haptic Environments on Time Delay Discrimination in Force Feedback
Time delay in haptic telepresence arising from compression or communication alters the phase characteristics of the environment impedance. This paper describes how well a human ope...
Markus Rank, Zhuanghua Shi, Hermann J. Müller...
CVPR
2012
IEEE
13 years 6 months ago
Parameterizing interpersonal behaviour with Laban movement analysis - A Bayesian approach
—In this paper we propose a probabilistic model to parameterize human interactive behaviour from human motion. To Support the model taxonomy, we use Laban Movement Analysis (LMA)...
Kamrad Khoshhal Roudposhti, Luís Santos, Ha...
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
15 years 11 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...