Sciweavers

4415 search results - page 57 / 883
» How to Pair with a Human
Sort
View
HIP
2005
Springer
124views Cryptology» more  HIP 2005»
14 years 4 months ago
How Much Assurance Does a PIN Provide?
Abstract. We would like to quantify the assurance contained in an authentication secret. For instance, how much assurance does a customer convey to a bank by revealing that his Per...
Jon Louis Bentley, Colin Mallows
ECAI
2004
Springer
14 years 4 months ago
Avatars That Learn How to Behave
It is possible to model avatars that learn to simulate object manipulations and other complex actions. A number of applications may benefit from this technique including safety, e...
Adam Szarowicz, Paolo Remagnino
GROUP
2003
ACM
14 years 4 months ago
How push-to-talk makes talk less pushy
This paper presents an exploratory study of college-age students using two-way, push-to-talk cellular radios. We describe the observed and reported use of cellular radio by the pa...
Allison Woodruff, Paul M. Aoki
BC
2005
88views more  BC 2005»
13 years 11 months ago
Threading neural feedforward into a mechanical spring: How biology exploits physics in limb control
A solution is proposed of the hitherto unsolved problem as to how neural feedforward through inverse modelling and negative feedback realised by a mechanical spring can be combined...
Karl-Theodor Kalveram, Thomas Schinauer, Steffen B...

Tutorial
769views
15 years 9 months ago
How to be a Programmer: A Short, Comprehensive, and Personal Summary
"To be a good programmer is difficult and noble. The hardest part of making real a collective vision of a software project is dealing with one's coworkers and customers. ...
Robert L. Read