Sciweavers

7504 search results - page 435 / 1501
» Computing with Action Potentials
Sort
View
TRUST
2009
Springer
15 years 11 months ago
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some ver...
Sven Türpe, Andreas Poller, Jan Steffan, Jan-...
INTETAIN
2009
Springer
15 years 11 months ago
Robosonic: Randomness-Based Manipulation of Sounds Assisted by Robots
In this text, we intend to explore the possibilities of sound manipulation in a context of augmented reality (AR) through the use of robots. We use the random behaviour of robots i...
Filipe Costa Luz, Rui Pereira Jorge, Vasco Bila
123
Voted
MHCI
2009
Springer
15 years 11 months ago
Practices in creating videos with mobile phones
Mobile phones with integrated video cameras have become ubiquitous tools that people use both to document everyday surroundings and to express themselves artistically. In this pap...
Arto Puikkonen, Jonna Häkkilä, Rafael Ba...
TABLETOP
2008
IEEE
15 years 11 months ago
ShapeTouch: Leveraging contact shape on interactive surfaces
Many interactive surfaces have the ability to detect the shape of hands or objects placed on them. However, shape information is typically either condensed to individual contact p...
Xiang Cao, Andrew D. Wilson, Ravin Balakrishnan, K...
TABLETOP
2008
IEEE
15 years 11 months ago
Presenting using two-handed interaction in open space
Based on recent demonstrations of low-cost, infrared-based point tracking, we explore two-handed, surface-less interaction for presentation. On both hands, thumb and index finger...
Luc Vlaming, Jasper Smit, Tobias Isenberg