Communicating the subtleties of a craft technique, like putting a zipper into a garment or throwing a clay pot, can be challenging even when working side by side. Yet HowTo conten...
Cristen Torrey, Elizabeth F. Churchill, David W. M...
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
With the constant advances in technology that lead to the increasing of the transistor count and processor frequency, power dissipation is becoming one of the major issues in high...
We present a real-time algorithm to estimate the 3D
pose of a previously unseen face from a single range im-
age. Based on a novel shape signature to identify noses in
range ima...
We present a user-friendly approach to unifying program creation and execution, based on a notion of "tangible values" (TVs), which are visual and interactive manifestat...