Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
Digital games have the ability to engage both children and adults alike. We are exploring the use of games for children with long term treatment regimes, where motivation for comp...
Carolyn R. Watters, Michael A. Shepherd, Azza Abou...
Group-to-individual (G2I) distributed meeting is an important but understudied area. Because of the asymmetry between different parties in G2I meetings, it has two unique challeng...
Yong Rui, Eric Rudolph, Li-wei He, Rico Malvar, Mi...
— User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...
We present a set of interaction techniques for electronic musical performance using a tabletop tangible interface. Our system, the Audiopad, tracks the positions of objects on a t...