In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
The design of multi-touch multi-user tabletop user interfaces is still in its infancy and is not yet well understood. To date, published experimental results have primarily focuse...
This paper introduces a distributed haptic control architecture that can render direct interaction between users in addition to cooperative manipulation of virtual objects. The pr...
In this article, we explore a new role for the computer in art as a reflector of popular culture. Moving away from the static audiovisual installations of other artistic endeavors...
David A. Shamma, Sara Owsley, Kristian J. Hammond,...
As computers and other information technology move into cars and trucks, distraction-related crashes are likely to become an important problem. This paper begins to address this p...