Recent mobile devices often store massive images. However, typical interfaces such as 2D display with a limited size and discrete button inputs make the browsing and manipulation o...
Sunghoon Yim, Jane Hwang, Seungmoon Choi, Gerard J...
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
As computing expands its domain from workplace to pervasive and domestic environments, interest in aesthetics for designing is increasing in HCI. HCI literatures in aesthetics pro...
: In this paper, we present the experience gained with the participation in a case study in which a novel high-level design language (UML4SOA) was used to produce a service-oriente...
This paper presents the design of BORPH's file system layer for FPGA-based reconfigurable computers. BORPH provides user FPGA designs that execute as hardware processes acces...