We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of...
With the lack of admission control and resource reservation mechanisms in the Internet, overload situations can only be avoided by having the end systems deploying congestion cont...
ct 7 An increasingly frequent application of Machine Vision technologies is in automated surface inspection for the detection of defects in 8 manufactured products. Such systems oï...
Complex dialogs with comprehensive underlying data models are gaining increasing importance in today's Web applications. This in turn accelerates the need for highly dynamic ...
Patrick Freudenstein, Martin Nussbaumer, Florian A...
We conducted a 2.5 week longitudinal study with five motor impaired (MI) and four non-impaired (NMI) participants, in which they learned to use the Vocal Joystick, a voice-based u...
Susumu Harada, Jacob O. Wobbrock, Jonathan Malkin,...