One of the obstacles that hinder database trigger systems from their wide deployment is the lack of tools that aid users in creating trigger rules. Similar to understanding and spe...
In this paper, we describe an interface consisting of a virtual showroom where a team of two highly realistic 3D agents presents product items in an entertaining and attractive wa...
Boris Brandherm, Helmut Prendinger, Mitsuru Ishizu...
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
In this paper, we introduce Flashlight interaction, a new approach to light-based interaction between mobile phones and large screens by using the phone camera flashlight. Using a...
Alireza Sahami Shirazi, Christian Winkler, Albrech...
Metadocuments are documents that consist primarily of references to other documents, and elements within them. Our active browsing web visualization tool generates an evolving ser...