Sciweavers

835 search results - page 40 / 167
» A calculus of challenges and responses
Sort
View
OZCHI
2005
ACM
14 years 1 months ago
Emerging research methods for understanding mobile technology use
Mobile devices, applications and services have become integrated into people’s daily lives on a personal and professional level. Although traditional research methods are being ...
Penny Hagen, Toni Robertson, Melanie Kan, Kirsten ...
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
14 years 1 months ago
A Highly Legible CAPTCHA That Resists Segmentation Attacks
A CAPTCHA which humans find to be highly legible and which is designed to resist automatic character–segmentation attacks is described. As first detailed in [BR05], these ‘Sc...
Henry S. Baird, Michael A. Moll, Sui-Yu Wang
ATAL
2008
Springer
13 years 9 months ago
RIAACT: a robust approach to adjustable autonomy for human-multiagent teams
When human-multiagent teams act in real-time uncertain domains, adjustable autonomy (dynamic transferring of decisions between human and agents) raises three key challenges. First...
Nathan Schurr, Janusz Marecki, Milind Tambe
CHES
2008
Springer
128views Cryptology» more  CHES 2008»
13 years 9 months ago
Hash Functions and RFID Tags: Mind the Gap
Abstract. The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is ...
Andrey Bogdanov, Gregor Leander, Christof Paar, Ax...
ACL
2010
13 years 5 months ago
Using Speech to Reply to SMS Messages While Driving: An In-Car Simulator User Study
Speech recognition affords automobile drivers a hands-free, eyes-free method of replying to Short Message Service (SMS) text messages. Although a voice search approach based on te...
Yun-Cheng Ju, Tim Paek