Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
: Nowadays our world becomes more and more connected, and sensors and any kind of mobile (e.g. cell phones, PDAs) and fixed computational devices are linked together through wired...
In this paper we discuss a visual interface for presenting large images on small screen devices. We use the seam carving algorithm as an example technique to improve the readabili...
Stitching is a new interaction technique that allows users to combine pen-operated mobile devices with wireless networking by using pen gestures that span multiple displays. To st...
Enabling high performance, persistent mobile computing has recently become a very active research area. The widespread popularity of mobile computing devices, such as laptops, han...