Sciweavers

2399 search results - page 34 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2005
ACM
15 years 10 months ago
Visualization of mappings between schemas
In this paper we describe a novel approach to the visualization of the mapping between two schemas. Current approaches to visually defining such a mapping fail when the schemas or...
George G. Robertson, Mary Czerwinski, John E. Chur...
CHI
2000
ACM
15 years 2 months ago
Traversable interfaces between real and virtual worlds
Traversable interfaces establish the illusion that virtual and physical worlds are joined together and that users can physically cross from one to the other. Our design for a trav...
Boriana Koleva, Holger Schnädelbach, Steve Be...
DSVIS
1995
Springer
15 years 1 months ago
Moving between Contexts
Any action is performed in a particular context. So what does it mean to do the ‘same’ thing in a different context? There is no simple answer to this question , it depends on ...
Alan J. Dix
76
Voted
HCI
2009
14 years 7 months ago
A Modality Replacement Framework for the Communication between Blind and Hearing Impaired People
This paper presents a multimodal framework for the communication between blind and hearing impaired people. The algorithms that are developed are based on the concept of modality r...
Konstantinos Moustakas, Dimitrios Tzovaras, Laila ...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 1 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...