Sciweavers

2399 search results - page 43 / 480
» On Authentication between Human and Computer
Sort
View
ICPR
2006
IEEE
15 years 10 months ago
New Experiments on ICP-Based 3D Face Recognition and Authentication
In this paper, we discuss new experiments on face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity images,...
Boulbaba Ben Amor, Liming Chen, Mohsen Ardabilian
ISPA
2005
Springer
15 years 3 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
PADL
2001
Springer
15 years 2 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
CHI
2009
ACM
15 years 10 months ago
SLAP widgets: bridging the gap between virtual and physical controls on tabletops
We present Silicone iLluminated Active Peripherals (SLAP), a system of tangible, translucent widgets for use on multitouch tabletops. SLAP Widgets are cast from silicone or made o...
Malte Weiss, Julie Wagner, Yvonne Jansen, Roger Je...
CHI
2009
ACM
15 years 10 months ago
Exploring awareness needs and information display preferences between coworkers
1 Technology makes it possible to share many different types of information with coworkers. We conducted a large-scale survey (N=549) to better understand current sharing among co...
A. J. Bernheim Brush, Brian Meyers, James Scott, G...