Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
— Unlike terrestrial networks that mainly rely on radio waves for communications, underwater networks utilize acoustic waves, which have comparatively lower loss and longer range...
This paper presents a photo browsing system on mobile devices to browse and search photos efficiently by tilting action. It employs tilt dynamics and multi-scale photo screen layo...
Sung-Jung Cho, Roderick Murray-Smith, Yeun-Bae Kim
: Although avatars may resemble communicative interface agents, they have for the most part not profited from recent research into autonomous embodied conversational systems. In pa...