High-end mobile phones are quickly becoming versatile sensing platforms, capable of continuously capturing the dynamic context of their owners through various sensors. A change in...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
—We introduce methods for detecting in real-time information concerning bites taken during a meal. Our methods use an orientation sensor placed on the wrist of a user, and analyz...
In light of the increased awareness of global energy consumption, questions are also being asked about the contribution of computing equipment. Though studies have documented the ...
This paper proposes a hardware-based line feature enhancement approach that uses a palmprint acquisition device fitted with a time-sharing light source. When capturing images, two ...