Sciweavers

1818 search results - page 72 / 364
» How users use access control
Sort
View
IAT
2009
IEEE
14 years 3 months ago
Agent-Based Security System for User Verification
—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
TEI
2009
ACM
92views Hardware» more  TEI 2009»
14 years 3 months ago
TinkerSheets: using paper forms to control and visualize tangible simulations
This paper describes TinkerSheets, a paper-based interface to tangible simulations. The proposed interface combines the advantages of form-based input and paper. Form-based input ...
Guillaume Zufferey, Patrick Jermann, Auréli...
ACSAC
2010
IEEE
13 years 7 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
ICMCS
2006
IEEE
115views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Remote Control of a Networked Mobile Robot using an Immersive Locomotion Interface
Recently, the concept of behavioral media using a mobile robot has emerged in tele-robotics, where the mobile robot behaves as a user’s second body or an agent in a remote site....
Kazumasa Yamazawa, Masaki Tawada, Naokazu Yokoya
FGR
2004
IEEE
97views Biometrics» more  FGR 2004»
14 years 26 days ago
Recognizing Song-Based Blink Patterns: Applications for Restricted and Universal Access
We introduce a novel system for recognizing patterns of eye blinks for use in assistive technology interfaces and security systems. First, we present a blink-based interface for c...
Tracy L. Westeyn, Thad Starner