Sciweavers

2713 search results - page 481 / 543
» Designing Personal Tele-Embodiment
Sort
View
SOUPS
2010
ACM
14 years 29 days ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
HRI
2007
ACM
14 years 28 days ago
Natural person-following behavior for social robots
We are developing robots with socially appropriate spatial skills not only to travel around or near people, but also to accompany people side-by-side. As a step toward this goal, ...
Rachel Gockley, Jodi Forlizzi, Reid G. Simmons
CCS
2004
ACM
14 years 24 days ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
CNSR
2004
IEEE
14 years 24 days ago
A Topic Sharing Infrastructure for Weblog Networks
Weblogs have recently emerged as a popular means of sharing information on the Web. While they effectively foster the networking of participants on a one-to-one basis, so far they...
Sébastien Paquet, Phillip Pearson
ER
2006
Springer
137views Database» more  ER 2006»
14 years 22 days ago
Preference Functional Dependencies for Managing Choices
Abstract. The notion of user preference in database modeling has recently received much attention in advanced applications, such as personalization of e-services, since it captures...
Wilfred Ng