Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
This paper investigates the manner in which decisionmaking is influenced by the impressions given by lifelike agents in negotiation situations. These impressions comprise an agent...
We report on the design and initial evaluation of two methods for short text input in wearable computing applications using hand gestures. A wireless data glove able to recognize ...
The OpenChoice system, currently in development, is an open source, open access community rating and filtering service that would improve upon the utility of currently available W...
Many lovers separated by distance worry about their relationships, despite the fact that the use of various means of communication such as mobile phones and email is now widesprea...
This paper describes an extension to a multimodal system designed to improve Internet accessibility for the visually impaired. Here we discuss the novel application of a grid (pat...
Philip Strain, Graham McAllister, Emma Murphy, Rav...