Speech recognition has matured over the past years to the point that companies can seriously consider its use. However, from a developer’s perspective we observe that speech inp...
Werner Kurschl, Stefan Mitsch, Rene Prokop, Johann...
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
We present LookPoint, a system that uses eye input for switching input between multiple computing devices. LookPoint uses an eye tracker to detect which screen the user is looking...
Connor Dickie, Jamie Hart, Roel Vertegaal, Alex Ei...
Recently, schema mapping has found considerable interest in both research and practice. Determining matching components of database or XML schemas is needed in many applications, e...
Games for learning cannot take the same design approach as games when targeting audiences. While players of entertainment games have the luxury of choosing games that suit them, s...
Brian Magerko, Carrie Heeter, Joe Fitzgerald, Ben ...