For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Design science research involves creating and evaluating innovative methods and approaches to be used in design practice. We present an approach to be used in the process of desig...
Sven A. Carlsson, Stefan Henningsson, Stefan Hrast...
Haptic icons are brief, meaningful tactile or force stimuli designed to support the communication of information through the often-underutilized haptic modality. Challenges to pro...
Bradley A. Swerdfeger, Jennifer Fernquist, Thomas ...
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
Abstract We address the problem of vision-based navigation in busy inner-city locations, using a stereo rig mounted on a mobile platform. In this scenario semantic information beco...
Andreas Ess, Konrad Schindler, Bastian Leibe, Luc ...