Sciweavers

2399 search results - page 24 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2008
ACM
15 years 10 months ago
Biometric daemons: authentication via electronic pets
A well-known security and identification problem involves the creation of secure but usable identification and authentication tools that the user is fully motivated to adopt. We d...
Pamela Briggs, Patrick L. Olivier
DRM
2007
Springer
15 years 3 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
ITS
1992
Springer
152views Multimedia» more  ITS 1992»
15 years 1 months ago
People Power: A Human-Computer Collaborative Learning System
Abstract. This paper reports our research work in the new field of humancomputer collaborative learning (HCCL). The general architecture of an HCCL is defined. An HCCL system, call...
Pierre Dillenbourg, John A. Self
SOUPS
2005
ACM
15 years 3 months ago
Authentication using graphical passwords: effects of tolerance and image choice
Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed...
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget,...
TSD
2005
Springer
15 years 3 months ago
The Role of Speech in Multimodal Human-Computer Interaction
Abstract. Natural audio-visual interface between human user and machine requires understanding of user’s audio-visual commands. This does not necessarily require full speech and ...
Hynek Hermansky, Petr Fousek, Mikko Lehtonen