High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
We present change blindness redirection, a novel technique for allowing the user to walk through an immersive virtual environment that is considerably larger than the available ph...
Evan A. Suma, Seth Clark, David M. Krum, Samantha ...
Abstract Modeling tools typically have their own interaction methods for combining virtual objects. For realistic composition in 3D space, many researchers from the fields of virt...
Human motion capturing (HMC) from multiview image sequences constitutes an extremely difficult problem due to depth and orientation ambiguities and the high dimensionality of the s...
Gerard Pons-Moll, Andreas Baak, Juergen Gall, Laur...