Sciweavers

513 search results - page 6 / 103
» Persons, animals, and identity
Sort
View
FC
2008
Springer
102views Cryptology» more  FC 2008»
15 years 25 days ago
Identity Theft: Much Too Easy? A Study of Online Systems in Norway
Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal ...
André N. Klingsheim, Kjell Jørgen Ho...
ATAL
2008
Springer
15 years 1 months ago
Creating crowd variation with the OCEAN personality model
Most current crowd simulators animate homogeneous crowds, but include underlying parameters that can be tuned to create variations within the crowd. These parameters, however, are...
Funda Durupinar, Jan M. Allbeck, Nuria Pelechano, ...
JVCA
2006
128views more  JVCA 2006»
14 years 11 months ago
Facial actions as visual cues for personality
What visual cues do human viewers use to assign personality characteristics to animated characters? While most facial animation systems associate facial actions to limited emotion...
Ali Arya, Lisa N. Jefferies, James T. Enns, Steve ...
PERCOM
2009
ACM
15 years 11 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
55
Voted
CCS
2000
ACM
15 years 3 months ago
Threshold-based identity recovery for privacy enhanced applications
ÈÖ Ú Ý Ò ÓÙÒØ Ð ØÝ Ö ÔÓØ ÒØ ÐÐÝ ÓÒ Ø Ò ÓÖ ¹ Ò Þ Ø ÓÒ Ð Ò Ð Ð Ö ÕÙ Ö Ñ ÒØ× Û Ò ÔÔÖÓ Ý ÐÐÓÛ Ò Ù× Ö× ØÓ Ø Ô× Ù ÓÒ...
Joachim Biskup, Ulrich Flegel