Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
Named entities (e.g., "Kofi Annan", "Coca-Cola", "Second World War") are ubiquitous in web pages and other types of document and often provide a simpl...
Felix Weigel, Klaus U. Schulz, Levin Brunner, Edua...
A Multi-target user interface is composed of a series of interconnected variations of the same user interfaces, but tailored for different targets or different contexts of use. Wh...
The current practice of designing the auditory mode in the user interface is poorly understood. In this survey, we aim at revealing the common understanding of the role of audio i...
Christopher Frauenberger, Tony Stockman, Marie-Luc...
Abstract. This paper describes the development of a real-time perceptive user interface. Two cameras are used to detect a user’s head, eyes, hand, fingers and gestures. These cu...
Michael Van den Bergh, Ward Servaes, Geert Caenen,...