This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
This paper describes an alternative form of interaction for mobile devices using crossmodal output. The aim of our work is to investigate the equivalence of audio and tactile disp...
The evaluation of e-learning applications deserves special attention and evaluators need effective methodologies and appropriate guidelines to perform their task. We have proposed...
Carmelo Ardito, Maria Francesca Costabile, Antonel...
In this paper we present a number of augmented refrigerator magnet concepts. The concepts are shown to be derived from previous research into the everyday use of fridge surfaces. ...
Alex S. Taylor, Laurel Swan, Rachel Eardley, Abiga...