In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
To supplement existing forms of communication such as telephone and e-mail, this research proposes a new method of communicating “awareness” between people who are separated b...
Abstract. This paper describes a preliminary work devoted to the design of a control architecture for a defective haptic interface, i.e. an underactuated haptic interface not able ...
In this paper we describe extensions to our work on ThinSight, necessary to scale the system to larger tabletop displays. The technique integrates optical sensors into existing of...
Shahram Izadi, Alex Butler, Steve Hodges, Darren W...
Abstract. We describe a declarative language, called BAD (brain architecture description language), which we have developed for describing and then running brain models. Models are...