Sciweavers

2399 search results - page 75 / 480
» On Authentication between Human and Computer
Sort
View
NBIS
2009
Springer
15 years 4 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
SACMAT
2005
ACM
15 years 3 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
CHI
2007
ACM
15 years 10 months ago
Biases in human estimation of interruptibility: effects and implications for practice
People have developed a variety of conventions for negotiating face-to-face interruptions. The physical distribution of teams, however, together with the use of computer-mediated ...
Daniel Avrahami, James Fogarty, Scott E. Hudson
HVEI
2010
14 years 11 months ago
Isolating human brain functional connectivity associated with a specific cognitive process
The use of functional magnetic resonance imaging (fMRI) to measure functional connectivity among brain areas has the potential to identify neural networks associated with particul...
Michael A. Silver, Ayelet N. Landau, Thomas Z. Lau...
ICMCS
2000
IEEE
179views Multimedia» more  ICMCS 2000»
15 years 2 months ago
Mixing Realities in Shared Space: An Augmented Reality Interface for Collaborative Computing
In the Shared Space project, we explore, innovate, design and evaluate future computing environments that will radically enhance interaction between human and computers as well as...
Mark Billinghurst, Ivan Poupyrev, Hirokazu Kato, R...