Sciweavers

592 search results - page 33 / 119
» Learning of personalized security settings
Sort
View
ICPR
2004
IEEE
14 years 9 months ago
Visual Learning and Recognition of a Probabilistic Spatio-Temporal Model of Cyclic Human Locomotion
We present a novel representation of cyclic human locomotion based on a set of spatio-temporal curves of tracked points on the surface of a person. We start by extracting a set of...
Miha Peternel, Ales Leonardis
ICALT
2009
IEEE
13 years 5 months ago
Eye-Tracking Users' Behavior in Relation to Cognitive Style within an E-learning Environment
Eye-tracking measurements may be used as a method of identifying users' actual behavior in a hypermedia setting. In this research, an eye-tracking experiment was conducted in...
Nikos Tsianos, Panagiotis Germanakos, Zacharias Le...
MOBIHOC
2003
ACM
14 years 7 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
CCS
2008
ACM
13 years 10 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas
SOUPS
2009
ACM
14 years 2 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...