Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Recent advances in touch screen technology have increased the prevalence of touch screens and have prompted a wave of new touch screen-based devices. However, touch screens are st...
Shaun K. Kane, Jeffrey P. Bigham, Jacob O. Wobbroc...
Today's mobile phones represent a rich and powerful computing platform, given their sensing, processing and communication capabilities. Phones are also part of the everyday l...
Kiran K. Rachuri, Mirco Musolesi, Cecilia Mascolo,...
The design and implementation of a search engine for lecture webcasts is described. A searchable text index is created allowing users to locate material within lecture videos foun...
John Adcock, Matthew Cooper, Laurent Denoue, Hamed...
We present a novel visual creativity tool that automatically recognizes facial expressions and tracks facial muscle movements in real time to produce sounds. The facial expression...