A well-known security and identification problem involves the creation of secure but usable identification and authentication tools that the user is fully motivated to adopt. We d...
Visual markers are widely used in existing augmented reality (AR) applications [7, 12, 11, 19]. In most of such applications, the performance of an AR system depends highly on the...
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Abstract—After decades of effort working on database performance, the quality and the usability of database systems have received more attention in recent years. In particular, t...
Among other strategic action points, the Ambient Assisted Living Joint Programme framework has defined telemedicine and remote monitoring as major applications for improved qualit...