The rapid growth of mobile devices has made it challenging for users to maintain a consistent digital history among all their personal devices. Even with a variety of cloud computi...
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Abstract. It is difficult to track, parse and model human-computer interactions during editing and revising of documents, but it is necessary if we are to develop automated technol...
Motivated by the particular problems involved in communicating with "locked-in" paralysed patients, we aim to develop a braincomputer interface that uses auditory stimul...
N. Jeremy Hill, Thomas Navin Lal, Karin Bierig, Ni...
Abstract. While providing non-visual access to graphical user interfaces has been the topic of research for over 20 years, blind users still face many obstacles when using computer...