Login / Signup
Discreet verification of user identity in pervasive computing environments using a non-intrusive technique.
Ameera Al-Karkhi
Adil Al-Yasiri
Nigel Linge
Published in:
Comput. Electr. Eng. (2015)
Keyphrases
</>
information retrieval
pervasive computing environments
user interface
language model
user interaction
artificial intelligence
recommender systems