Sciweavers

504 search results - page 87 / 101
» Conversational Speech Biometrics
Sort
View
HICSS
1999
IEEE
78views Biometrics» more  HICSS 1999»
14 years 1 days ago
A Structured Transformation Approach for Legacy Information Systems - A Cash Receipts/Reimbursements Example
Legacy information systems are difficult to transform into the new or upgraded information systems. Part of the reason is being the incompatibility and the unscalability between t...
Jia-Lang Seng, Wayne Tsai
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
13 years 11 months ago
Temporal Patterns in Student-Advisor Instant Messaging Exchanges: Individual Variation and Accommodation
This study analyzed rhythm and timing in 18 instant messenger (IM) conversations between one advisor and four graduate students (4 dyads), hypothesizing that individuals would sho...
Amaury de Siqueira, Susan C. Herring
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
12 years 11 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
ICASSP
2011
IEEE
12 years 11 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
12 years 3 months ago
Do Me a Solid? Information Asymmetry, Liking, and Compliance Gaining Online
As the popularity of interactive social media grows, it is increasingly normal for individuals to reveal significant amounts of personal information online. Although this informat...
Nathan J. Claes, Carolyn Hurley, Michael A. Stefan...