Skip to main content

Home/ Groups/ CSIA 459
Cheryl Hoffman

Gait recognition without subject cooperation - 0 views

  •  
    This article addresses gait analysis from a non-lab perspective and looks at real work applicability.
Cheryl Hoffman

Baseline Results for the Challenge Problem of Human ID Using Gait Analysis - 0 views

  •  
    This article addresses the difficulties in gait analysis due to a lack of standards.
Cheryl Hoffman

A Study on Human Gait Analysis - 0 views

  •  
    This an article from the CCSEIT 2012 Conference. This paper examines the practicality of identifying people through their walking gait. Just a note, you'll need to click on the PDF icon to open the document up.
greg mack

Wireless BCI - 0 views

  •  
    This is a journal article detailing an experiment in which wireless rechargable devices were placed in non-human primates and successfully transmitted brain wave information without harming the animals.
greg mack

BCI in Virtual Reality - 1 views

  •  
    This is a journal article about an experiment in which participants used brainwaves to control actions in a virtual environment.
greg mack

PLOS ONE: Proprioceptive Feedback and Brain Computer Interface (BCI) Based Neuroprostheses - 0 views

  •  
    This is a journal article about an experiment regarding BCI, focusing on how feedback effects learning how to use brain controlled robotic limbs.
Justin Ohm

Fingerprint biometrics - 2 views

Here are the sources for my annotated bibliography on fingerprint biometrics. http://appleinsider.com/articles/13/06/20/apples-fingerprint-sensor-encapsulation-tech-could-be-used-in-future-iphone...

started by Justin Ohm on 07 Jul 13 no follow-up yet
scott thomas

Fingerprint Biometrics Allow Hospitals to Securely Access e-Prescriptions, EHRs - 0 views

  •  
    By Brian T. Horowitz | Posted 2011-03-02 Email Print Biometrics firms Bio-key and Lumidigm aid Genesis HealthCare System in Ohio in implementing finger-based biometrics for e-prescriptions and electronic health records.
Percy Kendrick

ANNOTATED BIBLOGRAPHY SOURCES - 0 views

  •  
    A review of security on the cloud.
Percy Kendrick

ANNOTATED BIBLIOGRAPHY SOURCES - 0 views

  •  
    How to secure a robust cloud storage with cryptography and access control.
Percy Kendrick

ANNOTATED BIBLIOGRAPHY SOURCES - 0 views

  •  
    Article discusses ideas on securing processes on outsourcing into the cloud which may be a good ideas as most folk or companies will require a vendor to perform cloud services.
Michael Madrzykowski

Annotated Bibliography sources - 0 views

Lee Bry

A temporal cloak at telecommunication data rate - 1 views

  •  
    The authors describe the most recent interactions with temporal cloaking and how it hides events in time altered spatial gaps that are not detected. The thought is that data can be hidden in the gaps, and thus providing a practical method for securing information during transmissions.
  •  
    Lee thank you for the summary. I read the article and was pretty amazed at the possibility. I seemed like something from a science fiction movie or a Star Trek show. The minds that can study these things are absolutely amazing.
« First ‹ Previous 101 - 120 of 336 Next › Last »
Showing 20 items per page