Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based gr...
For decades, researchers have presented different adaptive user interfaces and discussed the pros and cons of adaptation on task performance and satisfaction. Little research, how...
Krzysztof Z. Gajos, Mary Czerwinski, Desney S. Tan...
We describe a real-time 3-D augmented reality videoconferencing system. With this technology, an observer sees the real world from his viewpoint, but modified so that the image of...
Simon Prince, Adrian David Cheok, Farzam Farbiz, T...
In this paper we propose a novel framework for efficiently extracting foreground objects in so called shortbaseline image sequences. We apply the obtained segmentation to improve...
This paper describes a virtual reality system that realizes both an avatar motion control and a virtual object manipulation without avatar representation. Our goal is to do seamle...