Sciweavers

2399 search results - page 450 / 480
» On Authentication between Human and Computer
Sort
View
IUI
2010
ACM
14 years 4 months ago
A POMDP approach to P300-based brain-computer interfaces
Most of the previous work on non-invasive brain-computer interfaces (BCIs) has been focused on feature extraction and classification algorithms to achieve high performance for the...
Jaeyoung Park, Kee-Eung Kim, Sungho Jo
WISEC
2010
ACM
14 years 3 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
GROUP
2009
ACM
14 years 2 months ago
WaterCooler: exploring an organization through enterprise social media
As organizations scale up, their collective knowledge increases, and the potential for serendipitous collaboration between members grows dramatically. However, finding people wit...
Michael J. Brzozowski
CSCWD
2007
Springer
14 years 2 months ago
An Integration Life Cycle for Semantic Web Services Composition
Business applications are more and more often developed on the basis of Web services. The aim is to provide platform independence and loose coupling between business applications ...
Muhammad Ahtisham Aslam, Jun Shen, Sören Auer...
ETRA
2006
ACM
101views Biometrics» more  ETRA 2006»
14 years 2 months ago
Gaze-contingent temporal filtering of video
We describe an algorithm for manipulating the temporal resolution of a video in real time, contingent upon the viewer’s direction of gaze. The purpose of this work is to study t...
Martin Böhme, Michael Dorr, Thomas Martinetz,...