Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
This paper outlines an awareness application called Tickertape. Tickertape is a tool that displays event notifications in the form of scrolling messages across a single-line windo...
Sara Parsowith, Geraldine Fitzpatrick, Simon M. Ka...
This paper describes the 3Book, a 3D interactive visualization of a codex book as a component for digital library and information-intensive applications. The 3Book is able to repr...
Stuart K. Card, Lichan Hong, Jock D. Mackinlay, Ed...
Computer games, often played with others, are a compelling pastime for many. However, they have been criticized for their mouse and keyboard or gamepad interactions, as they suppo...
Web image search is difficult in part because a handful of keywords are generally insufficient for characterizing the visual properties of an image. Popular engines have begun to ...
James Fogarty, Desney S. Tan, Ashish Kapoor, Simon...