Sciweavers

380 search results - page 18 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
HF
2002
95views more  HF 2002»
15 years 3 months ago
Formal Verification of Human-Automation Interaction
This paper discusses a formal and rigorous approach to the analysis of operator interaction with machines. It addresses the acute problem of detecting design errors in human-machi...
Asaf Degani, Michael Heymann
CG
2005
Springer
15 years 3 months ago
Sloppy selection: Providing an accurate interpretation of imprecise selection gestures
This paper describes on-going work in the analysis of motion dynamics in pen-based interaction. The overall goal is the creation of a model of user motion in pen gestures where co...
Edward Lank, Eric Saund
123
Voted
DBSEC
2010
126views Database» more  DBSEC 2010»
15 years 4 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
143
Voted
CSFW
2011
IEEE
14 years 3 months ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
167
Voted
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 9 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...