Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
In this paper we present a wall-sized input system with high accuracy input in the center and lower precision tracking on the remaining parts of the wall. This work complements th...
When a mobile user dials 911, a key to arriving to the emergency scene promptly is knowing the location of the mobile user. This paper presents SkyLoc, a GSM fingerprinting-based ...
Alex Varshavsky, Anthony LaMarca, Jeffrey Hightowe...
This paper presents novel text input methods for mobile devices. In particular, it shows how users can capture text from books, newspapers, and other objects by using the digital ...