The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The bound to factor large integers is dominated by the computational effort to discover numbers that are smooth, typically performed by sieving a polynomial sequence. On a von Neumann architecture, sieving has log-log amortized time complexity to check each value for smoothness. This work presents a neuromorphic sieve that achieves a constant time check for smoothness by exploiting two characteristic...
This work integrates deep learning and symbolic programming paradigms into a unified method for deploying applications to a neuromorphic system. The approach removes the need for coordination among disjoint co-processors by embedding both types entirely on a neuromorphic processor. This integration provides a flexible approach for using each technique where it performs best. A single neuromorphic...
This paper presents the first Keystroke Biometrics Ongoing evaluation platform and a Competition (KBOC) organized to promote reproducible research and establish a baseline in person authentication using keystroke biometrics. The ongoing evaluation tool has been developed using the BEAT platform and includes keystroke sequences (fixed-text) from 300 users acquired in 4 different sessions. In addition,...
A keystroke biometric system was extended to accommodate touchscreen keystroke features. In addition to the usual key-press and key-release timing features available from mechanical keyboards, the touchscreen features also included pressure, screen location, accelerometer, and gyroscope information. Short numeric input data, ten-digit numeric strings, were collected from 52 participants on identical...
Keystroke biometric samples are often collected under various conditions, such as different device types, increasing levels of practice through repetition, and subject impairment. Cross-domain comparisons, in which query samples are collected under different conditions than the template, generally lead to degraded performance. The difficulty in comparing samples from different domains can be viewed...
Visualization of phylogenetic trees became popular and has been widely used in biology, taxonomy, cloud computing, and bioinformatics. Different phylogenetic trees can be built based on different measures and methods. As a result, the problem became obvious when deciding which tree is better and most visually appealing. This often involves comparing two phylogenetic trees to each other. The main goal...
This work provides strong empirical evidence for a two-state generative model of typing behavior in which the user can be in either a passive or active state. Given key-press latencies with missing key names, the model is then used to spoof the key-press latencies of a user by exploiting the scaling behavior between inter-key distance and key-press latency. Key-press latencies with missing key names...
Keystroke dynamics authentication is not as widely used compared to other biometric systems. In recent years, keystroke dynamic authentication systems have gained interest because of low cost and integration with existing security systems. Many different methods have been proposed for data collection, feature representation, classification, and performance evaluation. The work presents a detailed...
This work presents the results of the One-handed Keystroke Biometric Identification Competition (OhKBIC), an official competition of the 8th IAPR International Conference on Biometrics (ICB). A unique keystroke biometric dataset was collected that includes freely-typed long-text samples from 64 subjects. Samples were collected to simulate normal typing behavior and the severe handicap of only being...
This paper presents and discusses several experiments in authorship authentication of short social network postings, an average of 20.6 words, from Facebook. The goal of this research is to determine the degree to which such postings can be authenticated as coming from the purported user and not from an intruder. Various sets of stylometry and ad hoc social networking features were developed to categorize...
For some behavioral biometrics, only the timestamps of a recurring event may be available. This is the case for the recently proposed random time interval (RTI) biometric in which a user repeatedly presses a single button. A dynamical systems approach is taken to deal with biometrics which are inherently one-dimensional. The methodology uses the minimum description length principle to find the optimal...
Many applications need methods for handling missing or insufficient data. This paper applies a correlation technique to improve the fallback methods previously used to handle the paucity of keystroke data from the infrequently used keys in a keystroke biometric system. The proposed statistical fallback model uses a correlation based fallback table based on the linear correlation between pairs of keys...
The knowledge about fragmentation processes in ion-ion interactions is fundamental in hadrontherapy and radiation protection in space missions. Hadrontherapy, based on 12C, features many advantages with respect to conventional radiation therapy with photons due to the possibility to shape the dose delivery region in tissues but side effects of the projectile fragmentation in healthy tissues are not...
Keystroke and stylometry behavioral biometrics were investigated with the objective of developing a robust system to authenticate students taking online examinations. This work responds to the 2008 U.S. Higher Education Opportunity Act that requires institutions of higher learning undertake greater access control efforts, by adopting identification technologies as they become available, to assure...
This study focuses on the development and evaluation of a new classification algorithm that halves the previously reported best error rate. Using keystroke data from 119 users, closed system performance was obtained as a function of the number of keystrokes per sample. The applications of interest are authenticating online student test takers and computer users in security sensitive environments....
The keystroke biometric classification system described in this study was evaluated on two types of short input - passwords and numeric keypad input. On the password input, the system outperforms 14 other systems evaluated in a previous study using the same raw input data. The three top performing systems in that study had equal error rates between 9.6% and 10.2%. With the classification system developed...
KENTROS (Kinetic ENergy and Time Resolution Optimized on Scintillator) is a relatively compact detector that has been projected and constructed in the framework of the INFN FRAG and TPS experiments. KENTROS has been designed for energy deposition and time of flight measurements of charged particles. The detector ensures an angular coverage from about 5 degrees up to about 90 degrees polar angle in...
Data windows of keyboard input are analyzed to continually authenticate computer users and verify that they are the authorized ones. Because the focus is on fast intruder detection, the authentication process operates on short bursts of roughly a minute of keystroke input, while the training process can be extensive and use hours of input. The biometric system consists of components for data capture,...
The present study aimed at describing the modifications of muscle synergies and spinal activity due to the absence of visual feedback, in patients affected by unilateral vestibular disease. Patients were tested both during unperturbed quite stance and walking while the activity of 7 bilateral muscles, from the leg to the trunk, were recorded for the estimation of muscle synergies and spinal activity...
It is well known that people exposed to a robotgenerated force field disturbing arm motion, are able to recover their unperturbed kinematic patterns. It has been also reported that muscle synergies undergoing the activation of many muscle groups are strongly consistent apart from external (e.g., reaching movements in the frontal or in the sagittal plane) or internal (e.g., severity and location of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.