Sciweavers

1384 search results - page 197 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
EUROCRYPT
2008
Springer
14 years 11 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
HUC
2007
Springer
15 years 4 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
ACMDIS
2010
ACM
14 years 10 months ago
The CLOTHO project: predicting application utility
When using the computer, each user has some notion that "these applications are important" at a given point in time. We term this subset of applications that the user va...
Joshua M. Hailpern, Nicholas Jitkoff, Joseph Subid...
HRI
2010
ACM
15 years 4 months ago
Toward understanding natural language directions
—Speaking using unconstrained natural language is an intuitive and flexible way for humans to interact with robots. Understanding this kind of linguistic input is challenging be...
Thomas Kollar, Stefanie Tellex, Deb Roy, Nicholas ...
HRI
2009
ACM
15 years 4 months ago
Field trial for simultaneous teleoperation of mobile social robots
Simultaneous teleoperation of mobile, social robots presents unique challenges, combining the real-time demands of conversation with the prioritized scheduling of navigational tas...
Dylan F. Glas, Takayuki Kanda, Hiroshi Ishiguro, N...