Search For:

Displaying 1-19 out of 19 total
Evaluating peripheral interaction
Found in: Proceedings of the 8th International Conference on Tangible, Embedded and Embodied Interaction (TEI '14)
By Andreas Butz, Attila von Thermann, Aurélien Tabard, Doris Hausen, Kerstin Holzner
Issue Date:February 2014
pp. 21-28
Peripheral interaction, like ambient information systems (AIS), aims at leveraging the periphery of our attention. While ambient information systems address the perception of information, peripheral interaction targets lightweight interaction outside of th...
Implementation and implications of a stealth hard-drive backdoor
Found in: Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC '13)
By Anil Kurmus, Aurélien Francillon, Davide Balzarotti, Erik-Oliver Blass, Ioannis Koltsidas, Jonas Zaddach, Moitrayee Gupta, Travis Goodspeed
Issue Date:December 2013
pp. 279-288
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. This paper analyzes the catastrophic loss of security that occurs when hard disks are not trustworthy. First, we show that it is possible to compromise the fi...
Evaluating the benefits of using domain-specific modeling languages: an experience report
Found in: Proceedings of the 2013 ACM workshop on Domain-specific modeling (DSM '13)
By Aurèle Destailleur, Bernhard Dock, Friederike Gutzeit, Timo Wegeler
Issue Date:October 2013
pp. 7-12
There are many tools available for the creation of domain specific languages (DSLs) but the question remains how to identify appropriate use cases for the application of domain specific modeling and language design, and how to measure success. We report on...
Pl@ntNet mobile app
Found in: Proceedings of the 21st ACM international conference on Multimedia (MM '13)
By Aurélien Péronnet, Daniel Barthélémy, Hervé Goëau, Itheri Yahiaoui, Jennifer Carré, Julien Barbe, Pierre Bonnet, Souheil Selmi, Vera Bakić, Alexis Joly, Grégoire Duché, Jean-François Molino, Nozha Boujemaa
Issue Date:October 2013
pp. 423-424
Pl@ntNet is an image sharing and retrieval application for the identification of plants, available on iPhone and iPad devices. Contrary to previous content-based identification applications it can work with several parts of the plant including flowers, lea...
Found in: ACM SIGGRAPH 2013 Computer Animation Festival (SIGGRAPH '13)
By Aurélien Duhayon, Francis Canitrot, Maxence Martin, Paul Monge, Rémy Busson, Sébastien Iglesias
Issue Date:July 2013
pp. 1-1
A small group of cruise-ship revellers find themselves alone on a tropical island. Forced inland, their exploration reveals the mystery that lies at its heart.
Numerical optimization by multi-gene genetic programming
Found in: Proceeding of the fifteenth annual conference companion on Genetic and evolutionary computation conference companion (GECCO '13 Companion)
By Adriano Soares Koshiyama, André Vargas Abs da Cruz, Douglas Mota Dias, Marco Aurélio Cavalcanti Pacheco
Issue Date:July 2013
pp. 145-146
This paper presents a new method for numerical optimization problems based on Multi-Gene Genetic Programming. We discuss theoretical aspects, operators, representation, and experimental results.
Multitechnique paraphrase alignment: A contribution to pinpointing sub-sentential paraphrases
Found in: ACM Transactions on Intelligent Systems and Technology (TIST)
By Anne Vilnat, Auréelien Max, Houda Bouamor
Issue Date:June 2013
pp. 1-27
This work uses parallel monolingual corpora for a detailed study of the task of sub-sentential paraphrase acquisition. We argue that the scarcity of this type of resource is compensated by the fact that it is the most suited type for studies on paraphrasin...
Avec le temps!: time, tempo, and turns in human-computer interaction
Found in: CHI '13 Extended Abstracts on Human Factors in Computing Systems (CHI EA '13)
By Aurélien Tabard, Catherine Letondal, Eli Blevis, John C. Thomas, Thomas Erickson, Yue Pan
Issue Date:April 2013
pp. 3303-3306
Time is central to HCI. Humans have varying conceptions and experiences of time: linear versus cyclical; discrete versus continuous; personal versus collective. Computational systems also represent time in various ways. And interaction itself plays out ove...
Evaluating the utilization of Twitter messages as a source of security alerts
Found in: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13)
By Daniel Macêdo Batista, Luiz Arthur F. Santos, Marco Aurélio Gerosa, Rodrigo Campiolo
Issue Date:March 2013
pp. 942-943
The fast spread of computer security alerts, like vulnerabilities notifications, applications updates and threats of attacks, is essential to the implementation of efficient reactive measures against security incidents. This paper presents an empirical stu...
Enabling trusted scheduling in embedded systems
Found in: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12)
By Aanjhan Ranganathan, Aurélien Francillon, Claudio Marforio, Ramya Jayaram Masti, Srdjan Capkun
Issue Date:December 2012
pp. 61-70
The growing complexity and increased networking of security and safety-critical systems expose them to the risk of adversarial compromise through remote attacks. These attacks can result in full system compromise, but often the attacker gains control only ...
Analysis of the communication between colluding applications on modern smartphones
Found in: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12)
By Aurélien Francillon, Claudio Marforio, Hubert Ritzdorf, Srdjan Capkun
Issue Date:December 2012
pp. 51-60
Modern smartphones that implement permission-based security mechanisms suffer from attacks by colluding applications. Users are not made aware of possible implications of application collusion attacks---quite the contrary---on existing platforms, users are...
Decentralized documents authoring system for decentralized teamwork: matching architecture with organizational structure
Found in: Proceedings of the 17th ACM international conference on Supporting group work (GROUP '12)
By Aurélien Bénel, Dominique Gaïti, Frédéric Merle, Guillaume Doyen
Issue Date:October 2012
pp. 117-120
While systems for collaborative distributed works focus on enhancing distributed work group productivity, little attention has been paid to their architecture. In fact, most of these systems rely on centralized ones for both user communications and data ho...
On realistic evaluation of recent spatial and temporal mobility metrics for mobile ad hoc networks
Found in: Proceedings of the 10th ACM international symposium on Mobility management and wireless access (MobiWac '12)
By Elmano Ramalho Cavalcanti, Marco Aurélio Spohn
Issue Date:October 2012
pp. 107-114
Results from recent studies have pointed out that two well-known spatial and temporal mobility metrics for mobile ad hoc networks have critical drawbacks. At the same time, two new spatial and one temporal mobility metrics have been proposed and validated ...
Simplification and streaming of GIS terrain for web clients
Found in: Proceedings of the 17th International Conference on 3D Web Technology (Web3D '12)
By Aurélien Barbier-Accary, Fabien Cellier, Pierre-Marie Gandoin, Raphaëlle Chaine, Samir Akkouche
Issue Date:August 2012
pp. 73-81
The application needs in 3D visualization culminate today, in particular in the field of geographic information systems (GIS), as evidenced by the popularity of applications like Google Earth or Google Map. Meanwhile, the popular success of mobile devices ...
Evolutionary algorithms applied to elucidate ionic water cluster structure formation
Found in: Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference (GECCO '12)
By Ênio Frota da Silveira, André Silva Pimentel, Marco Aurélio Cavalcanti Pacheco, Omar Paranaiba Vilela Neto
Issue Date:July 2012
pp. 1151-1158
In this work we present two evolutionary algorithms applied to look for positive water cluster structures. Both algorithms were applied in order to simulate the formation of the aggregates using the neutral clusters as a precursor. In other words, we are n...
Enterprise Architectures for Cloud Computing
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Laura Aureli,Arianna Pierfranceschi,Holger Wache
Issue Date:June 2012
pp. 979-980
In this paper we describe an approach to graphicallyexternalize the cloud potential of a company, considering itsarchitectural description. For this purpose it is shown howcurrent architectural description can be extended, in terms ofknowledge and graphica...
Mediated tabletop interaction in the biology lab: exploring the design space of the rabbit
Found in: Proceedings of the 13th international conference on Ubiquitous computing (UbiComp '11)
By Aurélien Tabard, Jakob E. Bardram, Juan David Hincapié-Ramos
Issue Date:September 2011
pp. 301-310
Interactive surfaces like diffuse illumination tabletops (DIT) identify and track objects using multiple techniques like shape and color recognition, fiducial markers, electronic components, and RFID tags. However, tracking becomes more complex when dealin...
Cascade scheme face detection using a non-liniar classifier
Found in: Image Analysis for Multimedia Interactive Services, International Workshop on
By Antonio Rama, Francesc Tarres, Aureli Soria-Frisch
Issue Date:May 2009
pp. 153-156
In this paper, the non-linear fuzzy integral operator is proposed for combining different sets of Haar features for face detection. The proposed method presents a lower false detection rate than the State-of-the-art AdaBoost face detector by a similar true...
Bio-Inspired Framework for the Fusion of Chromatic, Infrared and Textural Information
Found in: Pattern Recognition, International Conference on
By Javier Ruiz-del-Solar, Aureli Soria-Frisch
Issue Date:September 2000
pp. 3576
The simultaneous progress on sensor and signal processing technologies stimulate the implementation of more refined pattern recognition systems in order to solve problems of increasing complexity. This progress induced the development of the here presented...