We present results of a study that considers (a) gestures outside the context of a specific implementation and (b) their use in supporting secondary, rather than primary tasks in ...
Today's mobile and wireless users access multimedia content from different types of networks and terminals. Content analysis plays a critical role in developing effective sol...
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used du...
Many applications of wireless ad hoc sensor and actuator networks (WSANs) rely on the knowledge of node locations. These are challenging to obtain when nodes are mobile and are not...
Nowadays it has become increasingly common for family members to be distributed in different time zones. These time differences pose specific challenges for communication within t...
Xiang Cao, Abigail Sellen, A. J. Bernheim Brush, D...