Skip to main content

Home/ Groups/ CSIA 459
Cheryl Hoffman

Gait recognition without subject cooperation - 0 views

  •  
    This article addresses gait analysis from a non-lab perspective and looks at real work applicability.
Cheryl Hoffman

Baseline Results for the Challenge Problem of Human ID Using Gait Analysis - 0 views

  •  
    This article addresses the difficulties in gait analysis due to a lack of standards.
Cheryl Hoffman

A Study on Human Gait Analysis - 0 views

  •  
    This an article from the CCSEIT 2012 Conference. This paper examines the practicality of identifying people through their walking gait. Just a note, you'll need to click on the PDF icon to open the document up.
greg mack

Wireless BCI - 0 views

  •  
    This is a journal article detailing an experiment in which wireless rechargable devices were placed in non-human primates and successfully transmitted brain wave information without harming the animals.
greg mack

BCI in Virtual Reality - 1 views

  •  
    This is a journal article about an experiment in which participants used brainwaves to control actions in a virtual environment.
greg mack

PLOS ONE: Proprioceptive Feedback and Brain Computer Interface (BCI) Based Neuroprostheses - 0 views

  •  
    This is a journal article about an experiment regarding BCI, focusing on how feedback effects learning how to use brain controlled robotic limbs.
scott thomas

Fingerprint Biometrics Allow Hospitals to Securely Access e-Prescriptions, EHRs - 0 views

  •  
    By Brian T. Horowitz | Posted 2011-03-02 Email Print Biometrics firms Bio-key and Lumidigm aid Genesis HealthCare System in Ohio in implementing finger-based biometrics for e-prescriptions and electronic health records.
Percy Kendrick

ANNOTATED BIBLOGRAPHY SOURCES - 0 views

  •  
    A review of security on the cloud.
Percy Kendrick

ANNOTATED BIBLIOGRAPHY SOURCES - 0 views

  •  
    How to secure a robust cloud storage with cryptography and access control.
Percy Kendrick

ANNOTATED BIBLIOGRAPHY SOURCES - 0 views

  •  
    Article discusses ideas on securing processes on outsourcing into the cloud which may be a good ideas as most folk or companies will require a vendor to perform cloud services.
Michael Madrzykowski

Annotated Bibliography sources - 0 views

Lee Bry

A temporal cloak at telecommunication data rate - 1 views

  •  
    The authors describe the most recent interactions with temporal cloaking and how it hides events in time altered spatial gaps that are not detected. The thought is that data can be hidden in the gaps, and thus providing a practical method for securing information during transmissions.
  •  
    Lee thank you for the summary. I read the article and was pretty amazed at the possibility. I seemed like something from a science fiction movie or a Star Trek show. The minds that can study these things are absolutely amazing.
Jessica Riedel

Mozilla: Ad Networks Have No 'Constitutional Right' To Set Cookies - 2 views

  •  
    With all of the privacy issues running rampant today, it looks like Mozilla is taking a stand against third-party cookies. Essentially they want to stop the third-party cookies from collecting data about the user's browsing habits and create the Internet people expect. Even though it isn't mentioned I think its an excellent marketing strategy against other browsers, cough cough Google, that rely on these cookies to track user habits and provide/tailor their product. This is a short description of the article: Mozilla recently drew the ire of the online ad industry by announcing plans to move forward with a project to block third-party cookies in the Firefox browser. Randall Rothenberg, President and CEO of the Interactive Advertising Bureau, publicly called on the company to retreat, arguing that it shouldn't try to implement "economic and cultural policies."
  •  
    It's bad enough that retailers are looking into or actually using camera footage to capture our spending and shopping habits without posting any warning. Thanks for the artical posting.
  •  
    I give Monzilla credit for being the first to step up about this issue. If they could stop the third party cookies I am sure a lot of users would jump over to their browser. The problem is that data is used for advertising which is used by companies like Monzilla to sell advertising space
Lee Bry

Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments - 1 views

  •  
    Other applications of cloaking other than hiding information during transmission, is the hiding of communication source location(s); knowing where the communications are happening is a real threat for communicators. Spatial cloaking, ability to hide physical objects, in this instance loosely used, provides the ability to keep peer-to-peer (P2P) communication sources anonymous with regards to geographic constraints; however, temporal cloaking is also employed to hide a person's whereabouts during specified times.
« First ‹ Previous 101 - 120 of 332 Next › Last »
Showing 20 items per page