Papers by Jean Renard Ward
IEEE Computer Graphics and Applications, 1985
Protection of identification documents using open cryptography
The present invention provides methods and apparatus to uniquely determine fabrication details as... more The present invention provides methods and apparatus to uniquely determine fabrication details associated With objects, such as identification documents, artwork and limited issue Works, using open cryptographic techniques. A cryptographic signature is created using a private key. The private key is uniquely associated With fabrication details such as a Workstation, operator, fabrication equipment, fabrication materials, etc. A public key corresponds With the private key; and therefore, the public key is associated With the fabrication details. Successfully decoding the cryptographic signature With the public key uniquely identifies the fabrication details.
IEEE Computer Graphics and Applications, 1987

Anomalies in measuring speed and other dynamic properties with touchscreens and tablets
2019 International Conference of the Biometrics Special Interest Group (BIOSIG), 2019
Touchscreens and tablets are often used in different studies and applications to capture high-res... more Touchscreens and tablets are often used in different studies and applications to capture high-resolution drawing, handwriting, or signatures. Several studies tend to analyse different properties, such as peaks or changes of the time derivatives of the coordinates; like velocity, angular velocity, acceleration or jerk of the movements. These are substantial features to analyse drawing, analyse or recognize handwriting, to examine the fluency of handwriting or verify signatures. The reliability of such a study strongly depends on the fidelity of the acquired data. We have tested several touchscreens and tablets which are widely used in different research studies, focusing on the resolution and accuracy of the coordinates and the uniformity of sampling. We have found that the vendors’ performance specifications (to the extent the vendor gives meaningful specifications) may seriously deviate from reality. Even if some of the raw data may look satisfactory at first sight, our examination...

UNIX as an environment for non-UNIX software development
ACM SIGSOFT Software Engineering Notes, 1985
Many of the back issues of SEN contain articles about software development environments and softw... more Many of the back issues of SEN contain articles about software development environments and software tools. UNIX has historically been cited as an example of a good software development environment. For many developers still struggling with the offspring of MS-DOS, RSX-11M, OS-370 and the like, UNIX still represents a dreamed-of state-of-the-art. Many of the more enhanced environments actually sit on top of UNIX or a UNIX-like system, especially for graphics-based environments like those offered by Sun Microsystems, Apollo, and Masscomp.Pencept's business is real-time character recognition for hand-"scribbled" text. Our products run in a completely non-UNIX environment, but all of our development is done on UNIX. This presented a unique opportunity to find out how good "standard" UNIX is for developing non-UNIX products.Based on our experience, we have come to the conclusion that UNIX is a good software development environment for the kinds of applications th...
Detection of system compromise by correlation of information objects
Method and apparatus for removing noise at the ends of a stroke
Method and apparatus for removing noise at the ends of a stroke caused by retracing
Apparatus and method for emulating computer keyboard input with a handprint terminal
User interface having simulated devices
Annotated Bibliography in On-line Character Recognition, Pen Computing, Gesture User Interfaces and Tablet and Touch Computers
Detection of system compromise by per-process network modeling
A method of reconfiguring a simulated keyboard device in a computer system
Computer with tablet input to standard programs
System and method for ad hoc management of credentials, trust relationships and trust history in computing environments

E N coMPUTING has become an industry in the first years of the 1990s, but pencomputing technology... more E N coMPUTING has become an industry in the first years of the 1990s, but pencomputing technology is not new. It had its beginnings in the late 1950s with the invention of the digitizing tablet-the device that electronically captures the x-y coordinates of pen-tip movement. Early tablets were opaque, which compelled the user to shift his or her attention from the writing surface to a separate VDT screen to see the output. Nonetheless, the invention precipitated considerable investigation of paper-like computer interfaces and real-time handwriting recognition. Research was actively pursued through the 1960s but declined in the 1970s. It rebounded in the 1980s as part of a broad effort to automate office work. The resurgence was strongly stimulated by an important hardware development: the integration of tablets and flat displays. Tablet/displays brought input and output to the same surface, which was the essential requirement for electronic "ink"-the instantaneous display of the stylus tip's trace directly under the stylus. This brought the hardware dramatically closer to its pen-and-paper paradigm.
System and method for trust in computer environments
UNIX as an environment for non-UNIX software development: a case history
ACM Sigsoft Software Engineering Notes, 1985
Many of the back issues of SEN contain articles about software development environments and softw... more Many of the back issues of SEN contain articles about software development environments and software tools. UNIX has historically been cited as an example of a good software development environment. For many developers still struggling with the offspring of MS-DOS, RSX-11M, OS-370 and the like, UNIX still represents a dreamed-of state-of-the-art. Many of the more enhanced environments actually sit on
First International Workshop on Pen-Based Learning Technologies (PLT 2007), 2007
The development of pen-centric shorthand handwriting recognition interfaces can provide the criti... more The development of pen-centric shorthand handwriting recognition interfaces can provide the critical infrastructure for natural pen-centric interactions to enhance many pen-centric learning applications. The technical innovations include chatroom and special-symbol shorthand as well as appropriate online handwriting recognition strategies for small form-factor devices. Famous writers throughout history have preferred and effectively used shorthand-Cicero's orations, Martin Luther's sermons, and Shakespeare's and George Bernard Shaw's plays were all written in a style of shorthand. Pen-centric shorthand innovations will provide faster text input for teaching, studying, and learning applications, providing the greatest impact on the utility of applications running on small mobile devices.
Uploads
Papers by Jean Renard Ward