Sciweavers

945 search results - page 148 / 189
» People are doing it for themselves
Sort
View
SIGOPS
1998
123views more  SIGOPS 1998»
13 years 10 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
KES
2007
Springer
13 years 10 months ago
Creating Chances Through Cognitive Niche Construction
Abstract As a matter of fact, humans continuously delegate and distribute cognitive functions to the environment to lessen their limits. They build models, representations, and oth...
Lorenzo Magnani
IWC
2008
84views more  IWC 2008»
13 years 9 months ago
I hate you! Disinhibition with virtual partners
This paper presents a descriptive lexical analysis of spontaneous conversations between users and the 2005 Loebner prize winning chatterbot, Jabberwacky. The study was motivated i...
Antonella De Angeli, Sheryl Brahnam
IJSR
2010
169views more  IJSR 2010»
13 years 9 months ago
A Component-Based Approach to Visual Person Tracking from a Mobile Platform
Abstract In this article, we present a component-based visual tracker for mobile platforms with an application to person tracking. The core of the technique is a componentbased des...
Simone Frintrop, Achim Königs, Frank Hoeller,...
JUCS
2010
154views more  JUCS 2010»
13 years 9 months ago
An Ambient Assisted Living Platform Integrating RFID Data-on-Tag Care Annotations and Twitter
: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
Diego López-de-Ipiña, Ignacio D&iacu...