Sciweavers

2399 search results - page 22 / 480
» On Authentication between Human and Computer
Sort
View
102
Voted
ICSE
2003
IEEE-ACM
16 years 2 months ago
Software Engineering Overlaps with Human-Computer Interaction: A Natural Evolution
It is argued that overlap between the Software Engineering and Human-Computer Interaction disciplines is part of a natural evolution that has been developing throughout the histor...
Allen E. Milewski
104
Voted
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 7 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
112
Voted
MEDIAFORENSICS
2010
15 years 3 months ago
Image forensic analyses that elude the human visual system
While historically we may have been overly trusting of photographs, in recent years there has been a backlash of sorts and the authenticity of photographs is now routinely questio...
Hany Farid, Mary J. Bravo
ECCV
2004
Springer
15 years 7 months ago
Authentic Emotion Detection in Real-Time Video
Abstract. There is a growing trend toward emotional intelligence in humancomputer interaction paradigms. In order to react appropriately to a human, the computer would need to have...
Yafei Sun, Nicu Sebe, Michael S. Lew, Theo Gevers
CHI
2009
ACM
16 years 2 months ago
Citedness, uncitedness, and the murky world between
We test a recent claim in an opinion piece (interactions, May/June 2008, pp. 45-47) that publications by HCI researchers have little or no impact. The alleged "phenomenon of ...
I. Scott MacKenzie