Pixel processing is becoming increasingly expensive for real-time applications due to the complexity of today’s shaders and highresolution framebuffers. However, most shading re...
Robert Herzog, Elmar Eisemann, Karol Myszkowski, H...
We introduce Whack Gestures, an inexact and inattentive interaction technique. This approach seeks to provide a simple means to interact with devices with minimal attention from t...
Scott E. Hudson, Chris Harrison, Beverly L. Harris...
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
— Wireless sensor network consisting of a large number of sensors is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited po...
Jae Duck Yu, Kyung Tae Kim, Bo Yle Jung, Hee Yong ...
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...