Sciweavers

13271 search results - page 160 / 2655
» Computers, Programming, and People
Sort
View
COMPSEC
2004
156views more  COMPSEC 2004»
15 years 4 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
PERCOM
2009
ACM
16 years 5 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
ICMCS
2008
IEEE
121views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Online video advertising based on user's attention relavancy computing
Information overload has become an important problem in the internet, and that all kinds of existing ads flood into people’s eyes causes scarcity of user’s attention. To provi...
Jinqiao Wang, Yikai Fang, Hanqing Lu
ICPR
2008
IEEE
15 years 10 months ago
Intelligence computing approach for seizure detection based on intracranial electroencephalogram (IEEG)
Epilepsy is a neurological disorder which causes two million people in the United States for suffering. In this research, we proposed a seizure detection method based on intracran...
Tsu-Wang Shen, Xavier Kuo, Chung-Shan Yu
ITNG
2007
IEEE
15 years 10 months ago
Human Computer Interaction Based Intrusion Detection
—In this paper we survey the state of the art in direct and indirect human computer interaction based biometrics. Direct HCI biometrics are based on abilities, style, preference,...
Roman V. Yampolskiy