A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices
[article]
2017
arXiv
pre-print
We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices. ...
Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices. ...
In this work, we focus on voice-powered IoT devices and propose a proximity-based user authentication method (PIANO) for voice-powered IoT devices. ...
arXiv:1704.03118v1
fatcat:da42gpivrrctnhvjbqcccxjgwm
PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices
2017
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices. ...
Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices. ...
In this work, we focus on voice-powered IoT devices and propose a proximity-based user authentication method (PIANO) for voice-powered IoT devices. ...
doi:10.1109/icdcs.2017.68
dblp:conf/icdcs/GongOWCSSJB17
fatcat:ykeqdwzadvf5pi3lmifl7tn5ne
Internet of Things (IoT): A Basic Concept and Analysis Security Issues
2020
Zenodo
Abstract— The internet of things (IoT) is a huge dynamic global network infrastructure of internet enabled physical and virtual objects to connecting on concept as anything, anytime, anyplace, any place ...
In this paper review, analysis and briefly about IoT environment which consists of IoT definitions, elements, characteristics, architectures, technologies, application domains, and analyze the security ...
INTRODUCTION The Internet of Things is a concept of connecting many devices and people on the world to the Internet. ...
doi:10.5281/zenodo.4361757
fatcat:el4obwtz5neu5lwrvl6athp2gm
Delivery of User Intentionality between Computer and Wearable for Proximity-based Bilateral Authentication
2021
International Journal of Advanced Computer Science and Applications
Recent research discovers that delivering user intentionality for authentication resolves a random authentication problem in a proximity-based authentication. ...
We developed a prototype of our authentication system on which a list of experiments was conducted. ...
Two typical technologies for user authentication intent delivery include wristband-based authentication for desktop computers (SAW) [10] and proximity-based user authentication on voice-powered Internet-of-Things ...
doi:10.14569/ijacsa.2021.0121085
fatcat:cy5odawlhzet5de55zo3yf7xom
Paper Titles
2019
2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)
Devices Based on Network Traffic
Estimation of User-Specific Visual Attention Based on Gaze Information of Similar Users
Evaluating the Drift-region Length Effect of nLDMOS on ESD Ability with a TLP ...
LANs System Design for Internet of Things Assisted Urban Aquaponics Farming
Tag-based Video Retrieval with Social Tag Relevance LearningTemporal Change by Measurement of Swallowing Sound The Design ...
doi:10.1109/gcce46687.2019.9015409
fatcat:6k3r6jixrvglrkrkzek636gb54
Unleashing the power of disruptive and emerging technologies amid COVID-19: A detailed review
[article]
2021
arXiv
pre-print
Thus, there is a rising need to unfold the power of emerging, future and disruptive technologies to explore all possible ways to fight against COVID-19. ...
Building on background insights, detailed technological specific use cases to fight against COVID-19 have been discussed in terms of their strengths, weaknesses, opportunities, and threats (SWOT). ...
Proximity Trace (Triax, 2020) is another solution that is based on device-to-device and deviceto-gateway signaling without any dependency on client's Wi-Fi or internet and location data (on site or off ...
arXiv:2005.11507v6
fatcat:ry4xvoxmknecdg2yytocnobooy
Software Sequencers and Cyborg Singers: Popular Music in the Digital Hypermodern
2009
New Formations
the archetypal nomadic device: quick, portable and powerful, but flexible enough to be used as an all-in-one mobile production studio. ...
Indeed, it undermines the imagined ideal of the voice as an unmediated and authentic expression of personality. ...
doi:10.3898/newf.66.06.2009
fatcat:2mphynvpzbeunmeo4pjgxrjd74
Adolescents' Digital Literacies in Flux: Intersections of Voice, Empowerment, and Practices
2019
Journal of Media Literacy Education
Overall, the voices of the adolescent-researchers offer ongoing authenticity to discussions of their practices, creating continued opportunities to rethink the implications and applications of digital ...
and (b) In what ways do adolescent-researchers' retrospective examinations of their own practices reveal their perspectives of these practices and the power (and power struggles) that underlie them? ...
He noted, "Sole focus on digital devices might just be the death knell of society." ...
doi:10.23860/jmle-2019-11-2-5
fatcat:my2cmvifjnb5fms6v73pslho24
Review of Three-Dimensional Human-Computer Interaction with Focus on the Leap Motion Controller
2018
Sensors
devices [13] and in particular mobile devices [14] , as well as voice-based interaction [15] . ...
, voice/language-based, form/dialog-based) [27] . ...
Funding: Parts of the work on this paper has been supported by the Center of excellence for logistics and IT, founded by the Ministry for Innovation, Science and Research of the State of North Rhine-Westphalia ...
doi:10.3390/s18072194
pmid:29986517
pmcid:PMC6068627
fatcat:x527tlhyzjdjpdrlsppwgm57m4
Correspondents Theory 1800/2000: Philosophical Reflections Upon Epistolary Technics And Praxis In The Analogue And Digital
2015
Zenodo
When we talk about things like the 'lost art of letter-writing' or the 'digital communications revolution,' what do we mean? ...
shaping of technology, overemphasise the radical novelty of the Internet, or simply deny or downplay ma [...] ...
Users determine the success of digital technologies; their voices have consequence. ...
doi:10.5281/zenodo.13889
fatcat:mzjqiccd55cmvj7yvm67wzvnlm
Semiotics of spreadability: A systematic approach to Internet memes and virality
2015
Punctum International Journal of Semiotics
Among these new, Internet-based linguistic systems, Internet memes are one of the most interesting and important. 1
Internet memes: An overview The notion of 'meme' 'Meme' (pron. ...
Internet users. ...
The 'GFW Turbo' escapes the power of the authorities and starts censoring keywords automatically. ...
doi:10.18680/hss.2015.0004
fatcat:6zyy2e6jnnalpcoovfzk7p5c3y
Potential of SoundCloud for mobile learning in music education: a pilot study
2017
International Journal of Mobile Learning and Organisation
A survey of 19 music students provides a window into their experience of mobile learning within the context of a high school music course. ...
In relation to four affordances of effective mobile learning tools, and situated learning theory, the benefits of making learning mobile, contextual, and visible are explored. ...
A majority of students indicated that they sometimes, or always adapt their future performances based on the self-reflection enabled through listening on SoundCloud. ...
doi:10.1504/ijmlo.2017.080895
fatcat:v5gzpht3hjc6rj2sofnxooredu
Potential of SoundCloud for mobile learning in music education: a pilot study
2017
International Journal of Mobile Learning and Organisation
A survey of 19 music students provides a window into their experience of mobile learning within the context of a high school music course. ...
In relation to four affordances of effective mobile learning tools, and situated learning theory, the benefits of making learning mobile, contextual, and visible are explored. ...
A majority of students indicated that they sometimes, or always adapt their future performances based on the self-reflection enabled through listening on SoundCloud. ...
doi:10.1504/ijmlo.2017.10001727
fatcat:7l74a3zr5zbqdhejmg6q4y55di
OK COMPUTER: Mobility, software and the laptop musician
2008
Information, Communication & Society
for others to comment on in Internet forums. ...
This sound-generating program possessed just one voice and one waveform, although pitch, loudness and duration could be modified. ...
doi:10.1080/13691180802108982
fatcat:6ov5y6eiafbilpvsudbqjggozu
Program
2020
2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)
terminal device ,microchip design , power efficiency and more broadly the Internet of Things (IoT), the chance to remotely connect to physical and virtual objects, mobile devices and products would have ...
To better protect users' privacy, various authentication mechanisms have been applied on smartphones. ...
Then we apply them to develop range-addressable memory to design a lightweight-slope lookup To study the effect of the Internet of Things (IoT) technology on the smart hospitals, we introduce a comprehensive ...
doi:10.1109/icce-taiwan49838.2020.9258230
fatcat:g25vw7mzvradxna2grlzp6kgiq
« Previous
Showing results 1 — 15 out of 770 results