We describe a technique to detect the presence of computer users. This technique relies on sonar using hardware that already exists on commodity laptop computers and other electro...
Stephen P. Tarzia, Robert P. Dick, Peter A. Dinda,...
Information Systems UI (User Interface) generation from declarative models has been the focus of numerous and various approaches in the human computer interaction community. Typic...
This paper presents a distributed user authentication scheme in wireless sensor networks. Our scheme is based on the self-certified keys cryptosystem (SCK), and we have modified i...
The utility of a mobile computer, such as a handheld or a laptop, is largely constrained by battery life. The display stands out as a major consumer of battery energy, so reducing...
Parthasarathy Ranganathan, Erik Geelhoed, Meera Ma...
The variety of engaging interactions among users in social medial distinguishes it from traditional Web media. Such a feature should be utilized while attempting to provide intell...
Jia Wang, Qing Li, Yuanzhu Peter Chen, Zhangxi Lin