Sciweavers

380 search results - page 54 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
ECSCW
2003
15 years 1 months ago
Applying Cyber-Archaeology
Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, la...
Quentin Jones
CMS
2003
148views Communications» more  CMS 2003»
15 years 1 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling
CHI
2008
ACM
16 years 5 days ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
SSDBM
2009
IEEE
77views Database» more  SSDBM 2009»
15 years 6 months ago
Query Recommendations for Interactive Database Exploration
Abstract. Relational database systems are becoming increasingly popular in the scientific community to support the interactive exploration of large volumes of data. In this scenar...
Gloria Chatzopoulou, Magdalini Eirinaki, Neoklis P...
COMPSAC
2003
IEEE
15 years 5 months ago
Data-Flow-Based Unit Testing of Aspect-Oriented Programs
The current research so far in aspect-oriented software development is focused on problem analysis, software design, and implementation techniques. Even though the importance of s...
Jianjun Zhao