Sciweavers

380 search results - page 8 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
CHI
1997
ACM
15 years 1 months ago
Beyond Fitts' Law: Models for Trajectory-Based HCI Tasks
Trajectory-based interactions, such as navigating through nested-menus, drawing curves, and moving in 3D worlds, are becoming common tasks in modern computer interfaces. Users’ ...
Johnny Accot, Shumin Zhai
IMC
2009
ACM
15 years 4 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
CCR
2004
151views more  CCR 2004»
14 years 9 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
91
Voted
AVBPA
2003
Springer
148views Biometrics» more  AVBPA 2003»
15 years 1 months ago
Scalability Analysis of Audio-Visual Person Identity Verification
In this work, we present a multimodal identity verification system based on the fusion of the face image and the text independent speech data of a person. The system conciliates th...
Jacek Czyz, Samy Bengio, Christine Marcel, Luc Van...
EDBT
2010
ACM
202views Database» more  EDBT 2010»
15 years 4 months ago
Querying trajectories using flexible patterns
The wide adaptation of GPS and cellular technologies has created many applications that collect and maintain large repositories of data in the form of trajectories. Previous work ...
Marcos R. Vieira, Petko Bakalov, Vassilis J. Tsotr...