Parameters in audio or video editing applications can mostly be controlled by a variety of hardware devices such as MIDI controllers. These, however, usually feature only a limite...
Kristian Gohlke, Michael Hlatky, Sebastian Heise, ...
In this paper we inquire material qualities for tangible user interfaces and introduce the term “ephemeral user interface”. We present an example user interface that employs f...
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
We investigate if the gaze (point of regard) can control a remote vehicle driving on a racing track. Five different input devices (on-screen buttons, mousepointing low-cost webcam...
Martin Tall, Alexandre Alapetite, Javier San Agust...