This paper describes a system that allows users who obtain a “wearable ID key” to personalize dynamically ubiquitous computers by simply touching them. We call the concept of ...
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
It is difficult for instructors of CS1 and CS2 courses to get accurate answers to such critical questions as "how long are students spending on programming assignments?"...
Christian Murphy, Gail E. Kaiser, Kristin Loveland...
This paper reports on an empirical study aimed at evaluating the utility of a reality-augmenting telepointer in a wearable videoconference system. Results show that using this tel...
The History Tablecloth is a flexible substrate screen-printed with electroluminescent material forming a grid of lace-like elements. When objects are left on the table, cells bene...
William W. Gaver, John Bowers, Andy Boucher, Andy ...