Sciweavers

2604 search results - page 217 / 521
» Human Errors and System Requirements
Sort
View
GLOBECOM
2010
IEEE
13 years 7 months ago
Optical Wireless Communications with Adaptive Subcarrier PSK Intensity Modulation
We propose an adaptive transmission technique for optical wireless (OW) systems, operating in atmospheric turbulence and employing subcarrier phase shift keying (S-PSK) intensity m...
Nestor D. Chatzidiamantis, Athanasios S. Lioumpas,...
AVBPA
2005
Springer
426views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Calculation of a Composite DET Curve
Abstract. The verification performance of biometric systems is normally evaluated using the receiver operating characteristic (ROC) or detection error trade-off (DET) curve. We p...
Andy Adler, Michael E. Schuckers
HRI
2009
ACM
14 years 4 months ago
Field trial for simultaneous teleoperation of mobile social robots
Simultaneous teleoperation of mobile, social robots presents unique challenges, combining the real-time demands of conversation with the prioritized scheduling of navigational tas...
Dylan F. Glas, Takayuki Kanda, Hiroshi Ishiguro, N...
CHI
2011
ACM
13 years 28 days ago
Of passwords and people: measuring the effect of password-composition policies
Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to gue...
Saranga Komanduri, Richard Shay, Patrick Gage Kell...
EWCBR
2000
Springer
14 years 28 days ago
Activating Case-Based Reasoning with Active Databases
Many of today's CBR systems are passive in nature: they require human users to activate them manually and to provide information about the incoming problem explicitly. In this...
Sheng Li, Qiang Yang