In this paper the term implicit human computer interaction is defined. It is discussed how the availability of processing power and advanced sensing technology can enable a shift ...
Context is critical for minimising ambiguity in object de-
tection. In this work, a novel context modelling framework
is proposed without the need of any prior scene segmen-
tat...
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Visualization users are increasingly in need of techniques for assessing quantitative uncertainty and error in the images produced. Statistical segmentation algorithms compute the...
Joe Michael Kniss, Robert L. Van Uitert Jr., Abrah...