Sciweavers

2399 search results - page 21 / 480
» On Authentication between Human and Computer
Sort
View
FGR
2004
IEEE
149views Biometrics» more  FGR 2004»
15 years 1 months ago
Authentic Facial Expression Analysis
It is argued that for the computer to be able to interact with humans, it needs to have the communication skills of humans. One of these skills is the ability to understand the em...
Nicu Sebe, Michael S. Lew, Ira Cohen, Yafei Sun, T...
CHI
2011
ACM
14 years 1 months ago
Of passwords and people: measuring the effect of password-composition policies
Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to gue...
Saranga Komanduri, Richard Shay, Patrick Gage Kell...
78
Voted
ESANN
2007
14 years 11 months ago
Human motion recognition using Nonlinear Transient Computation
A novel approach to human motion recognition is proposed that is based on a variation of the Nonlinear Transient Computation Machine (NTCM). The motion data used to train the NTCM ...
Nigel Crook, Wee Jin Goh
IJACTAICIT
2010
184views more  IJACTAICIT 2010»
14 years 7 months ago
Gesture Recognition for Human-Computer Interaction (HCI)
Considerable effort has been put towards developing intelligent and natural interfaces between users and computer systems. This is done by means of a variety of modes of informati...
Jane J. Stephan, Sana'a Khudayer
APNOMS
2009
Springer
15 years 4 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong