We conducted an ethnographic field study examining the ways in which building design teams used visual representations of data to coordinate their work. Here we describe our exper...
Detecting who is looking at whom during multiparty interaction is useful for various tasks such as meeting analysis. There are two contributing factors in the formation of where a...
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Due to its convenient, low physical restraint, and electric noise tolerant features, functional near-infrared spectroscopy (fNIRS) is expected to be a useful tool in monitoring use...
This paper investigates the problem of perceived instability during haptic texture rendering. We focus on the perceptual analysis of the stability of textured surfaces rendered wi...