Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
Materials such as wood or metal which are at equal temperatures are perceived to be of different ‘coldness’ due to differences in thermal properties, such as the thermal diffu...
— A new method for fast visual grasp of unknown objects using a camera mounted on a robot in an eye-inhand configuration is presented. The method is composed of a fast iterative...
One of many skills required to engage properly in a conversation is to know the appropiate use of the rules of engagement. In order to engage properly in a conversation, a virtual...
This paper proposes a novel remote face-to-face Mixed Reality (MR) system that enables two people in distant places to share MR space. Challenging issues to realize such an MR sys...