Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
In this paper, we present a video encoding scheme that uses object-based adaptation to deliver surveillance video to mobile devices. The method relies on a set of complementary vi...
Olivier Steiger, Touradj Ebrahimi, Andrea Cavallar...
We describe a new input method that utilizes patterned vibration that is generated through the finger writing on a textured pad. Using a flexible or a foldable textured pad which ...
Ji-Eun Kim, John Sunwoo, Yong-Ki Son, Dong-Woo Lee...
Palplates are a collection of touch-screen terminals placed around the office enabling human-computer interactions at the point of need. Supporting a community of mobile authentic...
It is sometimes a challenge to untangle the large amount of information on the Web. We thus need to adapt this information to a given user in a particular context. This adaptation...