We propose the "ninja cursor" to improve the performance of target acquisition, particularly on large screens. This technique uses multiple distributed cursors to reduce...
In this work, we introduce the use of tags to support the near synchronous use of instant messaging (IM). As a proof-of-concept, we developed a plug-in in Lotus Sametime, an enter...
Gary Hsieh, Jennifer Lai, Scott E. Hudson, Robert ...
In this paper, we introduce the change of a mobile phone's hardware shape as a means of tactile interaction. The alteration of shape is implemented in a hardware prototype us...
This study presents the "ChroMirror" system, a digital mirror imaging system which helps users select appropriate clothing color combinations. By digitally rendering a m...
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...