Sciweavers

2399 search results - page 9 / 480
» On Authentication between Human and Computer
Sort
View
NDSS
1999
IEEE
15 years 1 months ago
An Algebra for Assessing Trust in Certification Chains
Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes a...
Audun Jøsang
ICCV
2005
IEEE
15 years 11 months ago
Recovering Human Body Configurations Using Pairwise Constraints between Parts
The goal of this work is to recover human body configurations from static images. Without assuming a priori knowledge of scale, pose or appearance, this problem is extremely chall...
Xiaofeng Ren, Alexander C. Berg, Jitendra Malik
HRI
2012
ACM
13 years 5 months ago
A prototyping environment for interaction between a human and a robotic multi-agent system
In this paper we describe our prototyping environment to study concepts for empowering a single user to control robotic multi-agent systems. We investigate and validate these conc...
Michael Lichtenstern, Martin Frassl, Bernhard Peru...
113
Voted
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 3 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
NIPS
2007
14 years 11 months ago
Congruence between model and human attention reveals unique signatures of critical visual events
Current computational models of bottom-up and top-down components of attention are predictive of eye movements across a range of stimuli and of simple, fixed visual tasks (such a...
Robert J. Peters, Laurent Itti