Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
In this paper, we describe a prototype interface that facilitates the control of a mobile robot team by a single operator, using a sketch interface on a Tablet PC. The user draws a...
Marjorie Skubic, Derek Anderson, Samuel Blisard, D...
This paper addresses software plasticity, i.e. the ability of interactive systems to adapt to context of use while preserving user-centered properties. In plasticity, a classical a...
We investigate if the gaze (point of regard) can control a remote vehicle driving on a racing track. Five different input devices (on-screen buttons, mousepointing low-cost webcam...
Martin Tall, Alexandre Alapetite, Javier San Agust...