Sciweavers

47 search results - page 9 / 10
» Voice biometrics
Sort
View
USS
2010
13 years 7 months ago
Fighting Coercion Attacks in Key Generation using Skin Conductance
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion a...
Payas Gupta, Debin Gao
DAC
2005
ACM
14 years 10 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
HICSS
2002
IEEE
127views Biometrics» more  HICSS 2002»
14 years 2 months ago
Weaving Community with Community Fibre: Community Informatics and the Broadband Revolution
Unexpectedly, the widespread availability of very very high speed (Broadband) bandwidth into communities and within large centres has become not only a long-term possibility but a...
Michael Gurstein
HICSS
2002
IEEE
144views Biometrics» more  HICSS 2002»
14 years 2 months ago
Managing Long Term Communications: Conversation and Contact Management
Contact management is an important part of everyday work. People exchange business cards to try to enter each other’s contact lists. Local businesses provide refrigerator magnet...
Steve Whittaker, Quentin Jones, Loren G. Terveen
ICMI
2004
Springer
189views Biometrics» more  ICMI 2004»
14 years 3 months ago
A multimodal learning interface for sketch, speak and point creation of a schedule chart
We present a video demonstration of an agent-based test bed application for ongoing research into multi-user, multimodal, computer-assisted meetings. The system tracks a two perso...
Edward C. Kaiser, David Demirdjian, Alexander Grue...