A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Multi-flick, which consists of repeated flick actions, has received media attention as an intuitive and natural document-scrolling technique for stylus based systems. In this pape...
Current user interface widgets typically assume that the input device can only provide x-y position and binary button press information. Other inputs such as the continuous pressu...
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
—Alan Turing proposed a test for the intelligence of machines in 1950 [1]. Despite great efforts, no computer has passed this test so far. Each year, chat bots compete for the Lo...