Sciweavers

2399 search results - page 216 / 480
» On Authentication between Human and Computer
Sort
View
CANDC
2009
ACM
15 years 11 months ago
Cultivating creativity in tangible interaction design
As part of a larger team developing collaborations between computing and the arts, the co-authors created a general education undergraduate course, Tangible Interaction Design. We...
Fred G. Martin, Karen E. Roehr
ICCV
2007
IEEE
15 years 11 months ago
Interactive Feedback for Video Tracking Using a Hybrid Maximum Likelihood Similarity Measure
In this article, we present an object tracking system which allows interactive user feedback to improve the accuracy of the tracking process in real-time video. In addition, we des...
Ard Oerlemans, Bart Thomee
ISWC
2003
IEEE
15 years 10 months ago
KeyMenu: A Keyboard Based Hierarchical Menu
KeyMenu is a keyboard based hierarchical menu system intended for use on a wearable computer. It is designed for use in conjunction with the Twiddler one–handed wearable keyboar...
Kent Lyons, Nirmal J. Patel, Thad Starner
CONEXT
2007
ACM
15 years 8 months ago
Experimenting with real-life opportunistic communications using windows mobile devices
Pocket Switched Networks (PSN) is a novel communication paradigm which aims to exploit the opportunistic contacts between mobile devices to exchange data over multiple hops. A key...
Anna Kaisa Pietiläinen, Christophe Diot
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 5 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs