Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Designing CSCW systems that support the widely varying needs of targeted users is difficult. There is no silver bullet technology that enables users to effectively collaborate wit...
Will Humphries, D. Scott McCrickard, Dennis C. Nea...
—A large majority of the Internet traffic relies on TCP as its transport protocol. In future, as the edge of the Internet continues to extend over the wireless medium, TCP (or i...
Shravan Gaonkar, Romit Roy Choudhury, Luiz Magalha...
Abstract. A challenge for virtual reality (VR) applications is to increase the realism of an observer’s visual experience. For this purpose the variation of the blur an observer ...
We present an approach for inferring the topology of a camera network by measuring statistical dependence between observations in different cameras. Two cameras are considered con...