A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
This paper describes a project that uses real-world computer-troubleshooting scenarios to test and expand upon the latest research and technical knowledge in the area of procedura...
Axel Roesler, Connie Douglass-Olberg, David Brunet...
We present the uPen, a laser pointer combined with a contactpushed switch, three press buttons and a wireless communication module. This novel interaction device allows users to i...
We present the iterative design of Momento, a tool that provides integrated support for situated evaluation of ubiquitous computing applications. We derived requirements for Momen...
This paper presents a method for prototyping grasp-sensitive surfaces using optical fibers. In this system one end of a fiber bundle is attached to an image sensor. The other en...