Results 1 - 10
of
8,631
Table 1. Summary of Major Biometric Applications
"... In PAGE 1: ... Biometric recognition systems have been widely deployed in forensic, government and commercial applications. Table1 summarizes some of the major applications that use biometric technologies. In addition to these biometric traits, newer technologies based on diverse characteristics like vein scan, facial and hand thermography, ear shape, gait, keystroke dynamics and palm-print are under various stages of development.... ..."
Table 2 Repeat Keystrokes as a Ratio of all Keystrokes
2002
Cited by 43
Table 2. Selected results of the evaluation # of images for enrollment Template adaptation Feature
"... In PAGE 4: ...8GHz CPU. Table2 . Identification accuracy comparison based on automatically and manually extracted feature points.... In PAGE 24: ... Furthermore, the attack should be considered a zero-effort as mimicry was not considered in our study. Table2 shows the hardening effect before and after augmenting traditional username / password authentication scheme with keystroke dynamics analysis module. In Table 2, the FAR using conventional username / password credentials is 100%.... In PAGE 24: ... Table 2 shows the hardening effect before and after augmenting traditional username / password authentication scheme with keystroke dynamics analysis module. In Table2 , the FAR using conventional username / password credentials is 100%. In the our scheme we observe that the FAR drops to 7% and 5% in short and long passwords respectively.... In PAGE 24: ... 4. Future Work Password Hardening FAR(%) FRR(%) Password Type Before After Before After Short 100 7 0 7 Long 100 5 0 5 Table2 . System Password Hardening Effect Further researcsh may include the expansion of the user specific classifiers.... ..."
Table 1: Bandwidth of the number of keystrokes related to the strategies
"... In PAGE 2: ... Remaining Behaviour All users in the experiment succeeded in solving the task. The effort measured by the number of keystrokes varied among the users, even if they applied the same strategy ( Table1 ). This indicates that the amount of their remaining behaviour varied among users, since the number of keystrokes is assumed to be constant for each strategy.... ..."
Table 12. Minimum Number of Keystrokes for Retrieval
1996
"... In PAGE 34: ... The 20 locations were split into 4 groups of 5 locations, with the minimum number of keystrokes being equalized among groups. (See Table12 .) Locations were ordered... In PAGE 35: ... A shift activation was mistakenly ignored. The locations in Table12 that are shown in bold were originally believed to require one less keystroke. Table 12.... ..."
Table 2. Symptom key-stroke list
in Summary The Effects of Promethazine on Human Performance, Mood States, and Motion Sickness Tolerance
1996
TABLE 15. TIME/KEYSTROKE ANOVA
TABLE 16. TIME PER KEYSTROKE BY METHOD (SECONDS)
Table 1. Prediction Without vs. With Grammatical Tags: Keystroke Savings
17
"... In PAGE 3: ... Table1 . The first line of each test section in the table is the percentage of all keystrokes saved, the second line is the percentage of letter keystrokes saved, and the third line is the maximum percentage of letter keystrokes that could have been saved given the specific test text and database, which is identical for all conditions.... ..."
Results 1 - 10
of
8,631