Making Touch-based Mobile Phones Accessible for the Visually Impaired
Pra Veen
Virtual Keyboard ppt
Key Protection, CSI Eric Norman University of Wisconsin-Madison.
City of Charlotte Data Warehousing and Business Intelligence and Building Mashups By Example by Rattapoom Tuchinda, Pedro Szekely, and Craig A. Knoblock.
Introduction to ubiquitous security Kevin Wang. Scenario Take photos Ask position Position voice Time More information.
Reckon
Inseparable Keys: Phase III High-Tech Product Innovation (45-827) James Duan, Eric Lin, Ray Loo, Minh Vuong April 17, 2008.
Security in Computing Protection in General-Purpose Operating Systems.
Bully Blue Lock Final Presentation 2014 Senior Design I.
Key Protection, CSI
e-ball technology