Retrieving the stylus of a pen-based device takes time and requires a second hand. Especially for short intermittent interactions many users therefore choose to use their bare fin...
We present a new 4-key text entry method that, unlike most few-key methods, is gestural instead of selection-based. Importantly, its gestures mimic the writing of Roman letters fo...
Jacob O. Wobbrock, Brad A. Myers, Brandon Rothrock
In this paper we describe a system that allows users to annotate digital photos at the time of capture. The system uses camera phones with a lightweight client application and a s...
Anita Wilhelm, Yuri Takhteyev, Risto Sarvas, Nancy...
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
— The increasing ubiquity of wireless mobile devices is promoting unprecedented levels of electronic collaboration among devices interoperating to achieve a common goal. Issues r...
Radu Handorean, Rohan Sen, Gregory Hackmann, Gruia...