-
2
-
-
33947278317
-
Foveated visual search for corners
-
DOI 10.1109/TIP.2006.891335
-
ARNOW, T. AND BOVIK, A. 2007. Foveated visual search for corners. IEEE Trans. Image Proc. 16, 3, 813-823. (Pubitemid 46431976)
-
(2007)
IEEE Transactions on Image Processing
, vol.16
, Issue.3
, pp. 813-823
-
-
Arnow, T.L.1
Bovik, A.C.2
-
5
-
-
0025453627
-
Neural network approaches versus statistical methods in classification of multisource remote sensing data
-
DOI 10.1109/TGRS.1990.572944
-
BENEDIKTSSON, J., SWAIN, P., AND ERSOY, O. 1990. Neural network approaches versus statistical methods in classification of multisource remote sensing data. IEEE Trans. Geosci. Remote Sens. 28, 540-552. (Pubitemid 20737861)
-
(1990)
IEEE Transactions on Geoscience and Remote Sensing
, vol.28
, Issue.4
, pp. 540-552
-
-
Benediktsson Jon, A.1
Swain Philip, H.2
Ersoy Okan, K.3
-
6
-
-
78650165017
-
User authentication through keystroke dynamics
-
BERGADANO, F., GUNETTI, D., AND PICARDI, C. 2002. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5, 4, 367-397.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
7
-
-
0001629112
-
Novelty, complexity, and hedonic value
-
BERLYNE, D. 1970. Novelty, complexity, and hedonic value. Percep. Psych. 8, 5-A, 279-286.
-
(1970)
Percep. Psych.
, vol.8
, Issue.5 A
, pp. 279-286
-
-
Berlyne, D.1
-
8
-
-
0003611326
-
-
Lawrence Erlbaum Associates, Hillsdale, NJ
-
CARD, S., MORAN, T., AND NEWELL, A. 1983. The Psychology of Human-Computer Interaction. Lawrence Erlbaum Associates, Hillsdale, NJ.
-
(1983)
The Psychology of Human-Computer Interaction
-
-
Card, S.1
Moran, T.2
Newell, A.3
-
10
-
-
0016511691
-
Inspection of sheet metal materials: Model and data
-
DRURY, C. 1975. Inspection of sheet metal materials: model and data. Human Fact. 17, 257-265.
-
(1975)
Human Fact.
, vol.17
, pp. 257-265
-
-
Drury, C.1
-
11
-
-
0001017451
-
Visual detection method and probabilistic models for assessing information processing from brief visual displays
-
ESTES, W. AND TAYLOR, H. 1964. Visual detection method and probabilistic models for assessing information processing from brief visual displays. Proc. Nat. Acad. Sciences. 52. 446-454.
-
(1964)
Proc. Nat. Acad. Sciences
, vol.52
, pp. 446-454
-
-
Estes, W.1
Taylor, H.2
-
12
-
-
0343700185
-
Authentication by keystroke timing: Some prelimary results
-
Rand Corporation
-
GAINES, R., LISOWSKI, W., PRESS, S., AND SHAPIRO, N. 1980. Authentication by keystroke timing: some prelimary results. Rand rep. R-256-NSF, Rand Corporation.
-
(1980)
Rand Rep. R-256-NSF
-
-
Gaines, R.1
Lisowski, W.2
Press, S.3
Shapiro, N.4
-
13
-
-
8844279221
-
An identity authentication system based on human computer interaction behaviour
-
GAMBOA, H. AND FRED, A. 2004. An identity authentication system based on human computer interaction behaviour. In Proceedings of SPIE. Vol. 5404. 381-392.
-
(2004)
Proceedings of SPIE
, vol.5404
, pp. 381-392
-
-
Gamboa, H.1
Fred, A.2
-
14
-
-
0029284763
-
Separation of low-level and high-level factors in complex tasks: Visual search
-
GEISLER, W. AND CHOU, K. 1995. Separation of low-level and high-level factors in complex tasks: visual search. Psych. Rev. 102, 2, 356-378.
-
(1995)
Psych. Rev.
, vol.102
, Issue.2
, pp. 356-378
-
-
Geisler, W.1
Chou, K.2
-
16
-
-
0025728765
-
Perceptual filling in of artificially induced scotomas in human vision
-
GREGORY, R. 1991. Perceptual filling in of artificially induced scotomas in human vision. Nature 350, 699-702. (Pubitemid 21912300)
-
(1991)
Nature
, vol.350
, Issue.6320
, pp. 699-702
-
-
Ramachandran, V.S.1
Gregory, R.L.2
-
18
-
-
70349462779
-
Cognitive-based biometrics system for static user authentication
-
IEEE Computer Society, Los Alamitos, CA
-
HAMDY, O. AND TRAORE, I. 2009a. Cognitive-based biometrics system for static user authentication. In Proceedings of the IEEE International Conference on Internet Monitoring and Protection. IEEE Computer Society, Los Alamitos, CA, 90-97.
-
(2009)
Proceedings of the IEEE International Conference on Internet Monitoring and Protection
, pp. 90-97
-
-
Hamdy, O.1
Traore, I.2
-
19
-
-
70349739157
-
New physiological biometrics based on human cognitive factors
-
IEEE Computer Society, Los Alamitos, CA
-
HAMDY, O. AND TRAORE, I. 2009b. New physiological biometrics based on human cognitive factors. In Proceedings of the IEEE International Conference on Complex, Intelligent and Software Intensive Systems. IEEE Computer Society, Los Alamitos, CA, 910-917.
-
(2009)
Proceedings of the IEEE International Conference on Complex, Intelligent and Software Intensive Systems
, pp. 910-917
-
-
Hamdy, O.1
Traore, I.2
-
20
-
-
77958092470
-
Users authentication by a study of human computer interactions
-
HOCQUET, S., RAMEL, Y., AND CARDOT, H. 2004. Users authentication by a study of human computer interactions. In Proceedings of the 8th Annual (Doctoral) Meeting on Health, Science and Technology.
-
(2004)
Proceedings of the 8th Annual (Doctoral) Meeting on Health, Science and Technology
-
-
Hocquet, S.1
Ramel, Y.2
Cardot, H.3
-
21
-
-
70349445352
-
Information and the memory span
-
HYMAN, L. AND KAUFMAN, H. 1966. Information and the memory span. Perception Psych. 1, 235-237.
-
(1966)
Perception Psych.
, vol.1
, pp. 235-237
-
-
Hyman, L.1
Kaufman, H.2
-
22
-
-
26444603838
-
A multidisciplinary approach to biometrics
-
DOI 10.1109/TE.2005.849750
-
IVES, R., DU, Y., ETTER, D., AND WELCH, T. 2005. A multidisciplinary approach to biometrics. IEEE Trans. Educat. 48, 3, 462-471. (Pubitemid 41430914)
-
(2005)
IEEE Transactions on Education
, vol.48
, Issue.3
, pp. 462-471
-
-
Ives, R.W.1
Du, Y.2
Etter, D.M.3
Welch, T.B.4
-
23
-
-
84893405732
-
Data clustering: A review
-
JAIN, A. K., MURTY, M. N., AND FLYNN, P. J. 1999. Data clustering: A review. ACM Comput. Surv. 31, 3, 264-323.
-
(1999)
ACM Comput. Surv.
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
24
-
-
34748893645
-
Keystroke statistical learning model for web authentication
-
DOI 10.1145/1229285.1229327, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
JIANG, C.-H., SHIEH, S., AND LIU, J.-C. 2007. Keystroke statistical learning model for web authentication. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS'07). Singapore. 359-361. (Pubitemid 47479250)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 359-361
-
-
Jiang, C.-H.1
Shieh, S.2
Liu, J.-C.3
-
27
-
-
34548062358
-
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
-
DOI 10.1145/1276958.1277365, Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference
-
LEE, J.-W., CHOI, S.-S., AND MOON, B.-R. 2007. An evolutionary keystroke authentication based on ellipsoidal hypothesis space. In Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation (GECCO'07). 2090-2097. (Pubitemid 47291848)
-
(2007)
Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference
, pp. 2090-2097
-
-
Lee, J.-W.1
Choi, S.-S.2
Moon, B.-R.3
-
29
-
-
80051959725
-
-
Springer-Verlag, Berlin, Germany
-
MÜLLER, S. AND HENNIGER, O. 2007. Advances in Biometrics, Chapter: Evaluating the Biometric Sample Quality of Handwritten Signatures. Springer-Verlag, Berlin, Germany.
-
(2007)
Advances in Biometrics, Chapter: Evaluating the Biometric Sample Quality of Handwritten Signatures
-
-
Müller, S.1
Henniger, O.2
-
30
-
-
0000904883
-
Decision time without reaction time
-
NEISSER, U. 1963. Decision time without reaction time. Amer. J. Psych. 76, 376-385.
-
(1963)
Amer. J. Psych.
, vol.76
, pp. 376-385
-
-
Neisser, U.1
-
31
-
-
0008257479
-
Immediate memory in sequential tasks
-
POSNER, M. 1963. Immediate memory in sequential tasks. Psych. Bull., 333-349.
-
(1963)
Psych. Bull.
, pp. 333-349
-
-
Posner, M.1
-
32
-
-
0000754506
-
Rate of presentation and order of recall in immediate memory
-
POSNER, M. 1964. Rate of presentation and order of recall in immediate memory. Brit. J. Psych. 55, 303-306.
-
(1964)
Brit. J. Psych.
, vol.55
, pp. 303-306
-
-
Posner, M.1
-
34
-
-
85192902604
-
A survey of user authentication based on mouse dynamics
-
REVETT, K., JAHANKHANI, H., DE MAGALHAES, S., AND SANTOS, H. 2008. A survey of user authentication based on mouse dynamics. In Proceedings of 4th International Conference on Global E-Security (ICGeS'08). 210-219.
-
(2008)
Proceedings of 4th International Conference on Global E-Security (ICGeS'08)
, pp. 210-219
-
-
Revett, K.1
Jahankhani, H.2
De Magalhaes, S.3
Santos, H.4
-
35
-
-
80051966682
-
Intelligent system for analysis of emotional state and labour productivity
-
SENIUT, M., DZEMYDA, G., IVANIKOVAS, S., STANKEVIC, V., SIMKEVICIUS, C., AND JARUSEVICIUS, A. 2008. Intelligent system for analysis of emotional state and labour productivity. In Proceedings of the International Symposium on Automation and Robotics in Construction (ISARC'08). 429-434.
-
(2008)
Proceedings of the International Symposium on Automation and Robotics in Construction (ISARC'08)
, pp. 429-434
-
-
Seniut, M.1
Dzemyda, G.2
Ivanikovas, S.3
Stankevic, V.4
Simkevicius, C.5
Jarusevicius, A.6
-
36
-
-
15044355748
-
Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems
-
DOI 10.1109/TPAMI.2005.57
-
SNELICK, R., ULUDAG, U., MINK, A., INDOVINA, M., AND JAIN, A. 2005. Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. Percept. Psych. 27, 3, 450-455. (Pubitemid 40377335)
-
(2005)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.27
, Issue.3
, pp. 450-455
-
-
Snelick, R.1
Uludag, U.2
Mink, A.3
Indovina, M.4
Jain, A.5
-
38
-
-
0009153495
-
The computer as experimenter: Problems and prospects for social psychological research
-
STAND, D. AND O'CONNEL, E. 1974. The computer as experimenter: Problems and prospects for social psychological research. Behav. Res. Meth. Instrument. 6, 223-232.
-
(1974)
Behav. Res. Meth. Instrument.
, vol.6
, pp. 223-232
-
-
Stand, D.1
O'Connel, E.2
-
39
-
-
84963130403
-
Exposure duration as a confounding methodological factor in projective testing
-
STANG, D., CAMPUS, N., AND WALLACH, C. 1975. Exposure duration as a confounding methodological factor in projective testing. J. Person. Assess. 39, 6, 583-586.
-
(1975)
J. Person. Assess.
, vol.39
, Issue.6
, pp. 583-586
-
-
Stang, D.1
Campus, N.2
Wallach, C.3
-
40
-
-
84956859871
-
A User Identification System Using Signature Written with Mouse
-
SYUKRI, A., OKAMOTO, E., AND MAMBO, M. 1998. A user identification system using signature written with mouse. In Proceedings of the Australasian Conference on Information Security and Privacy (ACISP'98). Vol. 1438. 403-414. (Pubitemid 128101802)
-
(1998)
Lecture Notes in Computer Science
, Issue.1438
, pp. 403-414
-
-
Syukri, A.F.1
Okamoto, E.2
Mambo, M.3
-
41
-
-
0035974859
-
Visual search and attention: A signal detection theory approach
-
DOI 10.1016/S0896-6273(01)00392-0
-
VERGHESE, P. 2001. Visual search and attention: A signal detection theory approach. Neuron 31, 523-535. (Pubitemid 32835108)
-
(2001)
Neuron
, vol.31
, Issue.4
, pp. 523-535
-
-
Verghese, P.1
-
42
-
-
33845529124
-
Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions
-
VILLANI, M., TAPPERT, C., NGO, G., SIMONE, J., ST. FORT, H., AND CHA, S. 2006. Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions. In Proceedings of the Conference on Computer Vision and Pattern Recognition Workshop. 39.
-
(2006)
Proceedings of the Conference on Computer Vision and Pattern Recognition Workshop
, pp. 39
-
-
Villani, M.1
Tappert, C.2
Ngo, G.3
Simone, J.4
Fort, S.H.5
Cha, S.6
-
44
-
-
0004015006
-
-
Pearson Prentice-Hall
-
WICKENS, C., LEE, J., LIU, Y., AND BECKER, S. 2004. An Introduction to Human Factors Engineering. Pearson Prentice-Hall.
-
(2004)
An Introduction to Human Factors Engineering
-
-
Wickens, C.1
Lee, J.2
Liu, Y.3
Becker, S.4
|