Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








770 Hits in 5.7 sec

PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices [article]

Neil Zhenqiang Gong, Altay Ozen, Yu Wu, Xiaoyu Cao, Richard Shin, Dawn Song, Hongxia Jin, Xuan Bao
2017 arXiv   pre-print
We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices.  ...  Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices.  ...  In this work, we focus on voice-powered IoT devices and propose a proximity-based user authentication method (PIANO) for voice-powered IoT devices.  ... 
arXiv:1704.03118v1 fatcat:da42gpivrrctnhvjbqcccxjgwm

PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices

Neil Zhenqiang Gong, Altay Ozen, Yu Wu, Xiaoyu Cao, Richard Shin, Dawn Song, Hongxia Jin, Xuan Bao
2017 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)  
We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices.  ...  Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices.  ...  In this work, we focus on voice-powered IoT devices and propose a proximity-based user authentication method (PIANO) for voice-powered IoT devices.  ... 
doi:10.1109/icdcs.2017.68 dblp:conf/icdcs/GongOWCSSJB17 fatcat:ykeqdwzadvf5pi3lmifl7tn5ne

Internet of Things (IoT): A Basic Concept and Analysis Security Issues

Pensri Pukkasenung
2020 Zenodo  
Abstract— The internet of things (IoT) is a huge dynamic global network infrastructure of internet enabled physical and virtual objects to connecting on concept as anything, anytime, anyplace, any place  ...  In this paper review, analysis and briefly about IoT environment which consists of IoT definitions, elements, characteristics, architectures, technologies, application domains, and analyze the security  ...  INTRODUCTION The Internet of Things is a concept of connecting many devices and people on the world to the Internet.  ... 
doi:10.5281/zenodo.4361757 fatcat:el4obwtz5neu5lwrvl6athp2gm

Delivery of User Intentionality between Computer and Wearable for Proximity-based Bilateral Authentication

Jaeseong Jo, Eun-Kyu Lee, Junghee Jo
2021 International Journal of Advanced Computer Science and Applications  
Recent research discovers that delivering user intentionality for authentication resolves a random authentication problem in a proximity-based authentication.  ...  We developed a prototype of our authentication system on which a list of experiments was conducted.  ...  Two typical technologies for user authentication intent delivery include wristband-based authentication for desktop computers (SAW) [10] and proximity-based user authentication on voice-powered Internet-of-Things  ... 
doi:10.14569/ijacsa.2021.0121085 fatcat:cy5odawlhzet5de55zo3yf7xom

Paper Titles

2019 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)  
Devices Based on Network Traffic Estimation of User-Specific Visual Attention Based on Gaze Information of Similar Users Evaluating the Drift-region Length Effect of nLDMOS on ESD Ability with a TLP  ...  LANs System Design for Internet of Things Assisted Urban Aquaponics Farming Tag-based Video Retrieval with Social Tag Relevance LearningTemporal Change by Measurement of Swallowing Sound The Design  ... 
doi:10.1109/gcce46687.2019.9015409 fatcat:6k3r6jixrvglrkrkzek636gb54

Unleashing the power of disruptive and emerging technologies amid COVID-19: A detailed review [article]

Sonali Agarwal, Narinder Singh Punn, Sanjay Kumar Sonbhadra, M. Tanveer, P. Nagabhushan, K K Soundra Pandian, Praveer Saxena
2021 arXiv   pre-print
Thus, there is a rising need to unfold the power of emerging, future and disruptive technologies to explore all possible ways to fight against COVID-19.  ...  Building on background insights, detailed technological specific use cases to fight against COVID-19 have been discussed in terms of their strengths, weaknesses, opportunities, and threats (SWOT).  ...  Proximity Trace (Triax, 2020) is another solution that is based on device-to-device and deviceto-gateway signaling without any dependency on client's Wi-Fi or internet and location data (on site or off  ... 
arXiv:2005.11507v6 fatcat:ry4xvoxmknecdg2yytocnobooy

Software Sequencers and Cyborg Singers: Popular Music in the Digital Hypermodern

Nick Prior
2009 New Formations  
the archetypal nomadic device: quick, portable and powerful, but flexible enough to be used as an all-in-one mobile production studio.  ...  Indeed, it undermines the imagined ideal of the voice as an unmediated and authentic expression of personality.  ... 
doi:10.3898/newf.66.06.2009 fatcat:2mphynvpzbeunmeo4pjgxrjd74

Adolescents' Digital Literacies in Flux: Intersections of Voice, Empowerment, and Practices

Sandra Schamroth Abrams, Mary Beth Schaefer, Daniel Ness
2019 Journal of Media Literacy Education  
Overall, the voices of the adolescent-researchers offer ongoing authenticity to discussions of their practices, creating continued opportunities to rethink the implications and applications of digital  ...  and (b) In what ways do adolescent-researchers' retrospective examinations of their own practices reveal their perspectives of these practices and the power (and power struggles) that underlie them?  ...  He noted, "Sole focus on digital devices might just be the death knell of society."  ... 
doi:10.23860/jmle-2019-11-2-5 fatcat:my2cmvifjnb5fms6v73pslho24

Review of Three-Dimensional Human-Computer Interaction with Focus on the Leap Motion Controller

Daniel Bachmann, Frank Weichert, Gerhard Rinkenauer
2018 Sensors  
devices [13] and in particular mobile devices [14] , as well as voice-based interaction [15] .  ...  , voice/language-based, form/dialog-based) [27] .  ...  Funding: Parts of the work on this paper has been supported by the Center of excellence for logistics and IT, founded by the Ministry for Innovation, Science and Research of the State of North Rhine-Westphalia  ... 
doi:10.3390/s18072194 pmid:29986517 pmcid:PMC6068627 fatcat:x527tlhyzjdjpdrlsppwgm57m4

Correspondents Theory 1800/2000: Philosophical Reflections Upon Epistolary Technics And Praxis In The Analogue And Digital

Anthony John Charles Ross, Moss Michael, Susan Stuart
2015 Zenodo  
When we talk about things like the 'lost art of letter-writing' or the 'digital communications revolution,' what do we mean?  ...  shaping of technology, overemphasise the radical novelty of the Internet, or simply deny or downplay ma [...]  ...  Users determine the success of digital technologies; their voices have consequence.  ... 
doi:10.5281/zenodo.13889 fatcat:mzjqiccd55cmvj7yvm67wzvnlm

Semiotics of spreadability: A systematic approach to Internet memes and virality

Gabriele Marino
2015 Punctum International Journal of Semiotics  
Among these new, Internet-based linguistic systems, Internet memes are one of the most interesting and important. 1 Internet memes: An overview The notion of 'meme' 'Meme' (pron.  ...  Internet users.  ...  The 'GFW Turbo' escapes the power of the authorities and starts censoring keywords automatically.  ... 
doi:10.18680/hss.2015.0004 fatcat:6zyy2e6jnnalpcoovfzk7p5c3y

Potential of SoundCloud for mobile learning in music education: a pilot study

Heather J.S. Birch
2017 International Journal of Mobile Learning and Organisation  
A survey of 19 music students provides a window into their experience of mobile learning within the context of a high school music course.  ...  In relation to four affordances of effective mobile learning tools, and situated learning theory, the benefits of making learning mobile, contextual, and visible are explored.  ...  A majority of students indicated that they sometimes, or always adapt their future performances based on the self-reflection enabled through listening on SoundCloud.  ... 
doi:10.1504/ijmlo.2017.080895 fatcat:v5gzpht3hjc6rj2sofnxooredu

Potential of SoundCloud for mobile learning in music education: a pilot study

Heather J.S. Birch
2017 International Journal of Mobile Learning and Organisation  
A survey of 19 music students provides a window into their experience of mobile learning within the context of a high school music course.  ...  In relation to four affordances of effective mobile learning tools, and situated learning theory, the benefits of making learning mobile, contextual, and visible are explored.  ...  A majority of students indicated that they sometimes, or always adapt their future performances based on the self-reflection enabled through listening on SoundCloud.  ... 
doi:10.1504/ijmlo.2017.10001727 fatcat:7l74a3zr5zbqdhejmg6q4y55di

OK COMPUTER: Mobility, software and the laptop musician

Nick Prior
2008 Information, Communication & Society  
for others to comment on in Internet forums.  ...  This sound-generating program possessed just one voice and one waveform, although pitch, loudness and duration could be modified.  ... 
doi:10.1080/13691180802108982 fatcat:6ov5y6eiafbilpvsudbqjggozu

Program

2020 2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)  
terminal device ,microchip design , power efficiency and more broadly the Internet of Things (IoT), the chance to remotely connect to physical and virtual objects, mobile devices and products would have  ...  To better protect users' privacy, various authentication mechanisms have been applied on smartphones.  ...  Then we apply them to develop range-addressable memory to design a lightweight-slope lookup To study the effect of the Internet of Things (IoT) technology on the smart hospitals, we introduce a comprehensive  ... 
doi:10.1109/icce-taiwan49838.2020.9258230 fatcat:g25vw7mzvradxna2grlzp6kgiq
« Previous Showing results 1 — 15 out of 770 results