Sciweavers

2399 search results - page 474 / 480
» On Authentication between Human and Computer
Sort
View
CCS
2004
ACM
14 years 1 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
DIAGRAMS
2004
Springer
14 years 1 months ago
Bayesian Boxes: A Colored Calculator for Picturing Posteriors
The need for Bayesian inference arises in military intelligence, medical diagnosis and many other practical applications. The problem is that human inferences are generally conserv...
Kevin Burns
NETGAMES
2003
ACM
14 years 1 months ago
Bandwidth requirement and state consistency in three multiplayer game architectures
Abstract— Multiplayer games become increasingly popular, mostly because they involve interaction among humans. Typically, multiplayer games are organized based on a Client-Server...
Joseph D. Pellegrino, Constantinos Dovrolis
ALS
2003
Springer
14 years 1 months ago
Not Everything We Know We Learned
This is foremost a methodological contribution. It focuses on the foundation of anticipation and the pertinent implications that anticipation has on learning (theory and experiment...
Mihai Nadin
AUTOMOTIVEUI
2009
ACM
14 years 18 days ago
Towards an H-Mode for highly automated vehicles: driving with side sticks
The increasing traffic volume confronts the road user with a challenging task. The high number of traffic deaths might not be reducible with passive safety alone. However systems ...
Martin Kienle, Daniel Damböck, Johann Kelsch,...