Sciweavers

2399 search results - page 31 / 480
» On Authentication between Human and Computer
Sort
View
BVAI
2007
Springer
15 years 3 months ago
Classification with Positive and Negative Equivalence Constraints: Theory, Computation and Human Experiments
We tested the efficiency of category learning when participants are provided only with pairs of objects, known to belong either to the same class (Positive Equivalence Constraints ...
Rubi Hammer, Tomer Hertz, Shaul Hochstein, Daphna ...
ATAL
2011
Springer
13 years 9 months ago
A study of computational and human strategies in revelation games
Revelation games are bilateral bargaining games in which agents may choose to truthfully reveal their private information before engaging in multiple rounds of negotiation. They a...
Noam Peled, Ya'akov (Kobi) Gal, Sarit Kraus
WIAMIS
2009
IEEE
15 years 4 months ago
Adaptive gesture recognition in Human Computer Interaction
An adaptive, invariant to user performance fluctuation or noisy input signal, gesture recognition scheme is presented based on Self Organizing Maps, Markov Models and Levenshtein...
George Caridakis, Kostas Karpouzis, Athanasios I. ...
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 3 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
75
Voted
CHI
2004
ACM
15 years 10 months ago
Designing smooth connections between worlds
Currently there is a lack of explicit theories and few detailed guidelines to support the development of Mixed Reality (MR) technology and its varied applications. This research f...
Daniela Gorski Trevisan