Sciweavers

2399 search results - page 52 / 480
» On Authentication between Human and Computer
Sort
View
ACL
2012
13 years 4 days ago
Learning to "Read Between the Lines" using Bayesian Logic Programs
Most information extraction (IE) systems identify facts that are explicitly stated in text. However, in natural language, some facts are implicit, and identifying them requires â€...
Sindhu Raghavan, Raymond J. Mooney, Hyeonseo Ku
ICB
2009
Springer
185views Biometrics» more  ICB 2009»
15 years 4 months ago
Pose Invariant Palmprint Recognition
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...
Chhaya Methani, Anoop M. Namboodiri
CANDT
2009
15 years 1 months ago
Active artifacts as bridges between context and community knowledge sources
The aim of the paper is twofold: i) understanding how to provide additional information that is reflective of current organizational context in knowledge production and use; ii) p...
Federico Cabitza, Carla Simone
ACL
2009
14 years 7 months ago
Correlating Human and Automatic Evaluation of a German Surface Realiser
We examine correlations between native speaker judgements on automatically generated German text against automatic evaluation metrics. We look at a number of metrics from the MT a...
Aoife Cahill
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 7 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau