Sciweavers

2399 search results - page 22 / 480
» On Authentication between Human and Computer
Sort
View
ICSE
2003
IEEE-ACM
15 years 9 months ago
Software Engineering Overlaps with Human-Computer Interaction: A Natural Evolution
It is argued that overlap between the Software Engineering and Human-Computer Interaction disciplines is part of a natural evolution that has been developing throughout the histor...
Allen E. Milewski
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 3 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
MEDIAFORENSICS
2010
14 years 11 months ago
Image forensic analyses that elude the human visual system
While historically we may have been overly trusting of photographs, in recent years there has been a backlash of sorts and the authenticity of photographs is now routinely questio...
Hany Farid, Mary J. Bravo
ECCV
2004
Springer
15 years 3 months ago
Authentic Emotion Detection in Real-Time Video
Abstract. There is a growing trend toward emotional intelligence in humancomputer interaction paradigms. In order to react appropriately to a human, the computer would need to have...
Yafei Sun, Nicu Sebe, Michael S. Lew, Theo Gevers
63
Voted
CHI
2009
ACM
15 years 10 months ago
Citedness, uncitedness, and the murky world between
We test a recent claim in an opinion piece (interactions, May/June 2008, pp. 45-47) that publications by HCI researchers have little or no impact. The alleged "phenomenon of ...
I. Scott MacKenzie