Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
In this paper, we report on our investigation into people’s ability to use the volume of their voice to control cursor movement to create drawings. Early analysis of the results...
Dharani Priyahansika Perera, R. T. Jim Eales, Kath...
Ubimedia is a concept where media files are embedded in everyday objects and the environment. We propose an approach where the user can read and write these files with his/her pe...
The complexity of most virtual environments prevents them being rendered in real time even on modern graphics hardware. Knowledge of the visual system of the user viewing the envi...
In this paper we introduce the Inverted Browser, a novel approach to enable mobile users to view content from their personal devices on public displays. The Inverted Browser is a ...
Mandayam T. Raghunath, Nishkam Ravi, Marcel-Catali...