-
8
-
-
85092792940
-
Operating system support for augmented reality applications
-
L. D'Antoni, A. Dunn, S. Jana, T. Kohno, B. Livshits, D. Molnar, A. Moshchuk, E. Ofek, F. Roesner, S. Saponas, et al. Operating system support for augmented reality applications. Hot Topics in Operating Systems (HotOS), 2013.
-
(2013)
Hot Topics in Operating Systems (HotOS)
-
-
D'Antoni, L.1
Dunn, A.2
Jana, S.3
Kohno, T.4
Livshits, B.5
Molnar, D.6
Moshchuk, A.7
Ofek, E.8
Roesner, F.9
Saponas, S.10
-
9
-
-
84857435937
-
Pedestrian detection: An evaluation of the state of the art
-
P. Dollar, C. Wojek, B. Schiele, and P. Perona. Pedestrian detection: An evaluation of the state of the art. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(4), 2012.
-
(2012)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.34
, Issue.4
-
-
Dollar, P.1
Wojek, C.2
Schiele, B.3
Perona, P.4
-
13
-
-
85024483594
-
-
60 FPS on Consoles. http://www. giantbomb. com/60-fpson-consoles/3015-3223/.
-
60 FPS on Consoles
-
-
-
14
-
-
84904507654
-
Dark patterns in proxemic interactions: A critical perspective
-
ACM
-
S. Greenberg, S. Boring, J. Vermeulen, and J. Dostal. Dark Patterns in Proxemic Interactions: A Critical Perspective. In Proceedings of the 2014 Conference on Designing Interactive Systems, pages 523-532. ACM, 2014.
-
(2014)
Proceedings of the 2014 Conference on Designing Interactive Systems
, pp. 523-532
-
-
Greenberg, S.1
Boring, S.2
Vermeulen, J.3
Dostal, J.4
-
15
-
-
85011990959
-
A design space to support the development of windshield applications for the car
-
New York, NY, USA, ACM
-
R. Haeuslschmid, B. Pfleging, and F. Alt. A design space to support the development of windshield applications for the car. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pages 5076-5091, New York, NY, USA, 2016. ACM.
-
(2016)
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16
, pp. 5076-5091
-
-
Haeuslschmid, R.1
Pfleging, B.2
Alt, F.3
-
16
-
-
84940382117
-
Clickjacking: Attacks and defenses
-
L.-S. Huang, A. Moshchuk, H. J. Wang, S. Schecter, and C. Jackson. Clickjacking: Attacks and defenses. In 21st USENIX Security Symposium, 2012.
-
(2012)
21st USENIX Security Symposium
-
-
Huang, L.-S.1
Moshchuk, A.2
Wang, H.J.3
Schecter, S.4
Jackson, C.5
-
18
-
-
84910668443
-
Enabling finegrained permissions for augmented reality applications with recognizers
-
S. Jana, D. Molnar, A. Moshchuk, A. M. Dunn, B. Livshits, H. J. Wang, and E. Ofek. Enabling finegrained permissions for augmented reality applications with recognizers. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Jana, S.1
Molnar, D.2
Moshchuk, A.3
Dunn, A.M.4
Livshits, B.5
Wang, H.J.6
Ofek, E.7
-
22
-
-
84983392881
-
A new benchmark for visionbased cyclist detection
-
X. Li, F. Flohr, Y. Yang, H. Xiong, M. Braun, S. Pan, K. Li, and D. M. Gavrila. A new benchmark for visionbased cyclist detection. In 2016 IEEE Intelligent Vehicles Symposium (IV), 2016.
-
(2016)
2016 IEEE Intelligent Vehicles Symposium (IV)
-
-
Li, X.1
Flohr, F.2
Yang, Y.3
Xiong, H.4
Braun, M.5
Pan, S.6
Li, K.7
Gavrila, D.M.8
-
23
-
-
84868295981
-
Military applications of augmented reality
-
Springer
-
M. A. Livingston, L. J. Rosenblum, D. G. Brown, G. S. Schmidt, S. J. Julier, Y. Baillot, J. E. Swan II, Z. Ai, and P. Maassel. Military applications of augmented reality. In Handbook of augmented reality, pages 671-706. Springer, 2011.
-
(2011)
Handbook of Augmented Reality
, pp. 671-706
-
-
Livingston, M.A.1
Rosenblum, L.J.2
Brown, D.G.3
Schmidt, G.S.4
Julier, S.J.5
Baillot, Y.6
Swan, I.I.J.E.7
Ai, Z.8
Maassel, P.9
-
24
-
-
20344401344
-
Dart: A toolkit for rapid design exploration of augmented reality experiences
-
ACM
-
B. MacIntyre, M. Gandy, S. Dow, and J. D. Bolter. Dart: A toolkit for rapid design exploration of augmented reality experiences. In Proceedings of the 17th ACM symposium on User Interface Software and Technology, pages 197-206. ACM, 2004.
-
(2004)
Proceedings of the 17th ACM Symposium on User Interface Software and Technology
, pp. 197-206
-
-
MacIntyre, B.1
Gandy, M.2
Dow, S.3
Bolter, J.D.4
-
25
-
-
85024494703
-
-
Magic Leap. https://www. magicleap. com/#/home.
-
Magic Leap
-
-
-
27
-
-
85024477128
-
-
https://www. metavision. com/.
-
-
-
-
28
-
-
85024498888
-
Magic Leap: A startup is betting more than half a billion dollars that it will dazzle you with its approach to creating 3-D imagery
-
R. Metz. Magic Leap: A startup is betting more than half a billion dollars that it will dazzle you with its approach to creating 3-D imagery. MIT Technology Review, 2015. https://www. Technologyreview. com/ s/534971/magic-leap/.
-
(2015)
Mit Technology Review
-
-
Metz, R.1
-
31
-
-
84990066570
-
-
CoRR, abs/1603. 00831
-
A. Milan, L. Leal-Taixé, I. D. Reid, S. Roth, and K. Schindler. MOT16: A benchmark for multi-object tracking. CoRR, abs/1603. 00831, 2016.
-
(2016)
MOT16: A Benchmark for Multi-object Tracking
-
-
Milan, A.1
Leal-Taixé, L.2
Reid, I.D.3
Roth, S.4
Schindler, K.5
-
34
-
-
84893271992
-
User-centered perspectives for automotive augmented reality
-
V. Ng-Thow-Hing, K. Bark, L. Beckwith, C. Tran, R. Bhandari, and S. Sridhar. User-centered perspectives for automotive augmented reality. In IEEE International Symposium on Mixed and Augmented Reality, 2013.
-
(2013)
IEEE International Symposium on Mixed and Augmented Reality
-
-
Ng-Thow-Hing, V.1
Bark, K.2
Beckwith, L.3
Tran, C.4
Bhandari, R.5
Sridhar, S.6
-
35
-
-
85024503358
-
-
http://www. pokemongo. com/.
-
-
-
-
36
-
-
84908689805
-
Markit: Privacy markers for protecting visual secrets
-
N. Raval, A. Srivastava, K. Lebeck, L. Cox, and A. Machanavajjhala. Markit: Privacy markers for protecting visual secrets. In Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE), 2014.
-
(2014)
Workshop on Usable Privacy & Security for Wearable and Domestic UbIquitous DEvices (UPSIDE)
-
-
Raval, N.1
Srivastava, A.2
Lebeck, K.3
Cox, L.4
Machanavajjhala, A.5
-
37
-
-
84979938897
-
What you mark is what apps see
-
N. Raval, A. Srivastava, A. Razeen, K. Lebeck, A. Machanavajjhala, and L. P. Cox. What you mark is what apps see. In MobiSys, 2016.
-
(2016)
MobiSys
-
-
Raval, N.1
Srivastava, A.2
Razeen, A.3
Lebeck, K.4
Machanavajjhala, A.5
Cox, L.P.6
-
38
-
-
85076323421
-
Securing embedded user interfaces: Android and beyond
-
F. Roesner and T. Kohno. Securing embedded user interfaces: Android and beyond. In USENIX Security Symposium, 2013.
-
(2013)
USENIX Security Symposium
-
-
Roesner, F.1
Kohno, T.2
-
39
-
-
84897010648
-
Security and privacy for augmented reality systems
-
F. Roesner, T. Kohno, and D. Molnar. Security and privacy for augmented reality systems. Communications of the ACM, 57(4):88-96, 2014.
-
(2014)
Communications of the ACM
, vol.57
, Issue.4
, pp. 88-96
-
-
Roesner, F.1
Kohno, T.2
Molnar, D.3
-
40
-
-
84910623331
-
World-driven access control for continuous sensing
-
F. Roesner, D. Molnar, A. Moshchuk, T. Kohno, and H. J. Wang. World-driven access control for continuous sensing. In ACM Conf. on Computer & Communications Security, 2014.
-
(2014)
ACM Conf. on Computer & Communications Security
-
-
Roesner, F.1
Molnar, D.2
Moshchuk, A.3
Kohno, T.4
Wang, H.J.5
-
47
-
-
85024503158
-
-
https://unity3d. com/.
-
-
-
-
50
-
-
85024492507
-
-
U. S. Department of Transportation, National Highway Traffic Safety Administration. Visual-Manual NHTSA Driver Distraction Guidelines For In-Vehicle Electronic Devices (Docket no. NHTSA-2010-0053)
-
U. S. Department of Transportation, National Highway Traffic Safety Administration. Visual-Manual NHTSA Driver Distraction Guidelines For In-Vehicle Electronic Devices (Docket No. NHTSA-2010-0053), 2010. http://www. distraction. gov/downloads/pdfs/visualmanual-nhtsa-driver-distraction-guidelines-for-invehicle-electronic-devices. pdf.
-
(2010)
-
-
-
51
-
-
84945183726
-
SurroundWeb: Mitigating privacy concerns in a 3D web browser
-
J. Vilk, A. Moshchuk, D. Molnar, B. Livshits, E. Ofek, C. Rossbach, H. J. Wang, and R. Gal. SurroundWeb: Mitigating privacy concerns in a 3D web browser. In IEEE Symposium on Security and Privacy, 2015.
-
(2015)
IEEE Symposium on Security and Privacy
-
-
Vilk, J.1
Moshchuk, A.2
Molnar, D.3
Livshits, B.4
Ofek, E.5
Rossbach, C.6
Wang, H.J.7
Gal, R.8
|