<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base=""  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Rainhard Findling&#039;s blog</title>
 <link>/blog/3</link>
 <description></description>
 <language>en</language>
<item>
 <title>10 million passwords: quick analysis underlines users&#039; need for usability in security</title>
 <link>/blog/10-million-passwords-quick-analysis</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A few days ago Mark Burnett fortunately &lt;a href=&quot;https://xato.net/passwords/ten-million-passwords/&quot; target=&quot;_blank&quot;&gt;released 10 million passwords captured for research to the public&lt;/a&gt;. Captured password lists are rarely that long - hence, this is a good opportunity to take a look at users&#039; password usage, and test if our findings are in line with common sense and previous research on password usage. At first we need to convert the file to UTF-8 (you can &lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/10-million-combos-utf8.7z&quot;&gt;download the converted file here&lt;/a&gt;). &lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/pw_length.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float: right; margin: 5px 0px 5px 20px;&quot; title=&quot;Histogram of password length&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/pw_length.png&quot; alt=&quot;&quot; width=&quot;375&quot; height=&quot;250&quot; /&gt;&lt;/a&gt;We then do a quick analysis of the data using a small &lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/pw-analysis.sh.7z&quot;&gt;Bash&lt;/a&gt; and &lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/pw-analysis.r&quot; target=&quot;_blank&quot;&gt;R script&lt;/a&gt;. Specifically, we look at password lengths and the most used passwords.&lt;/p&gt;
&lt;h3 class=&quot;header&quot;&gt;Distribution of password length&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When looking at the distribution of password length, we see that passwords of length 6 and 8 are used most. Length 3 and smaller seems to be used rarely, while above length 8 usage declines drastically.&lt;/p&gt;
&lt;h3 class=&quot;header&quot;&gt;Overall most frequently used passwords&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The most frequently passwords could easily be guessed or derived by dictionary attacks - or are related to patterns users type on their keyboards (e.g. keys aligned horizontally or vertically on the keyboard that get pressed serially, like 1qaz2wsx). To underline that his is not only true for the 10 most frequently used passwords we show excerpts up to the #3000 to #3010 most used passwords here. And - as expected - the overall most frequently used passwords are combinations of 123456... (different lengths and orders).&lt;/p&gt;
&lt;div style=&quot;clear: both; vertical-align: middle; text-align: center; padding-top: 10px; padding-bottom: 20px;&quot;&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_1_10.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;margin-right: 20px;&quot; title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_1_10.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;116&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_30_40.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;margin-right: 20px;&quot; title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_30_40.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;116&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_100_110.svg&quot; target=&quot;_blank&quot;&gt;&lt;img title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_100_110.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;116&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;clear: both; vertical-align: middle; text-align: center;&quot;&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_300_310.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;margin-right: 20px;&quot; title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_300_310.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;116&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_1000_1010.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;margin-right: 20px;&quot; title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_1000_1010.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;116&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_3000_3010.svg&quot; target=&quot;_blank&quot;&gt;&lt;img title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_3000_3010.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;116&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;clear: both; vertical-align: middle; text-align: center; font-size: 95%;&quot;&gt;(click to enlarge)&lt;/div&gt;
&lt;h3 class=&quot;header&quot;&gt;Most frequently used passwords per password length&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When looking at most frequently used passwords for specific lengths we see: the more the longer passwords get, the more users seem to try to related passwords to patterns on the keyboard layout (such as the vertically aligned 1qaz2wsx).&lt;/p&gt;
&lt;div style=&quot;clear: both; vertical-align: middle; text-align: center; padding-top: 10px; padding-bottom: 20px;&quot;&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len4.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;margin-right: 20px;&quot; title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len4.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;93&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len5.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;margin-right: 20px;&quot; title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len5.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;93&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len6.svg&quot; target=&quot;_blank&quot;&gt;&lt;img title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len6.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;93&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;clear: both; vertical-align: middle; text-align: center; padding-bottom: 20px;&quot;&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len7.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;margin-right: 20px;&quot; title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len7.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;93&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len8.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;margin-right: 20px;&quot; title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len8.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;93&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len9.svg&quot; target=&quot;_blank&quot;&gt;&lt;img title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len9.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;93&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;clear: both; vertical-align: middle; text-align: center;&quot;&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len10.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;margin-right: 20px;&quot; title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len10.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;93&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len11.svg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;margin-right: 20px;&quot; title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len11.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;93&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len12.svg&quot; target=&quot;_blank&quot;&gt;&lt;img title=&quot;&quot; src=&quot;/sites/default/files/blog/2015_02_10mio_pws/most_used_passwords_len12.png&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;93&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;clear: both; vertical-align: middle; text-align: center; font-size: 95%;&quot;&gt;(click to enlarge)&lt;/div&gt;
&lt;p&gt;While average users might already be aware that passwords like 123456 drastically decrease security and therefore are considered insecure, this might not be the case for passwords related to other keyboard layout patterns. Such patterns are even visible in passwords connected to possibly important accounts. Try some of the following grep filters on the password file to see examples:&lt;/p&gt;
&lt;pre class=&quot;content-script&quot;&gt;grep $&#039;root.*\t&#039; 10-million-combos-utf8.txt
grep $&#039;admin.*\t&#039; 10-million-combos-utf8.txt
grep $&#039;default.*\t&#039; 10-million-combos-utf8.txt
grep $&#039;config.*\t&#039; 10-million-combos-utf8.txt
grep $&#039;sql.*\t&#039; 10-million-combos-utf8.txt
grep $&#039;apache.*\t&#039; 10-million-combos-utf8.txt
grep $&#039;server.*\t&#039; 10-million-combos-utf8.txt
grep $&#039;wordpress.*\t&#039; 10-million-combos-utf8.txt
grep $&#039;bank.*\t&#039; 10-million-combos-utf8.txt
grep $&#039;research.*\t&#039; 10-million-combos-utf8.txt
grep $&#039;\.com\t&#039; 10-million-combos-utf8.txt
grep $&#039;\.at\t&#039; 10-million-combos-utf8.txt
grep $&#039;\.edu\t&#039; 10-million-combos-utf8.txt&lt;/pre&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;But most notably, these findings underline how users struggle to remember their secrets - hence use &quot;tricks&quot; to make remembering them easier, while also lowering the associated security.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Thu, 12 Feb 2015 12:33:17 +0000</pubDate>
 <dc:creator>rainhard.findling</dc:creator>
 <guid isPermaLink="false">177 at </guid>
 <comments>/blog/10-million-passwords-quick-analysis#comments</comments>
</item>
<item>
 <title>How to get your thesis topic started</title>
 <link>/blog/how-to-get-your-thesis-topic-started</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;Students often struggle to get their thesis topic started properly, because they simply don&#039;t know how to start at all. In the end students may find that they have missed and left out major areas which would be in their topic&#039;s focus - which makes their thesis incomplete then. Correcting these issues regularly leaves students with a very huge amount of extra work. To address this issues this small guide has been created, which gives a short overview of how to get your thesis started, and - as a part of the task - how to effectively read papers.&lt;/p&gt;
&lt;h3 class=&quot;header&quot;&gt;Major steps for getting your thesis topic started&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Learn how to effectively skim through/read papers&lt;/li&gt;
&lt;li&gt;Get an thorough overview of research done in your topic. You need to develop a &quot;feeling&quot; of what is already out there, and it&#039;s important to ensure to *not* miss any important sub-areas inside your research area.&lt;/li&gt;
&lt;li&gt;When reading papers, keep a well structured reference list from the start (e.g. JabRef) of all literature you find interesting.&lt;/li&gt;
&lt;li&gt;When having an overview and feeling of what is already there: discuss with your supervisor a) what is there and b) what to do next given this knowledge.&lt;/li&gt;
&lt;li&gt;Ensure you have finished all that before doing the major implementation of your thesis and writing the thesis itself.&lt;/li&gt;
&lt;/ol&gt;&lt;h3 class=&quot;header&quot;&gt;How to get an overview of research done in your topic&#039;s area, or: how to search for papers&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;You need to search for publications (see scientific search engines below). Therefore, think of phrases that represent what you search for and will be contained in publication titles of the research area. For the start, they can be very easy phrases, like for face detection on mobile devices: &quot;mobile face detection survey&quot; or &quot;mobile face detection review&quot;.&lt;/li&gt;
&lt;li&gt;For first searchings, combine your phrases with the words &quot;survey&quot;, &quot;review&quot; etc. as above. This way you will find publications that themselves sum up research in a particular research are up to the publication time. Such survey papers do this by listing/citing most important previous publications themselves (like with textbooks - for books you can use search terms containing e.g. &quot;introduction&quot; or &quot;book&quot;). Through these publications you will get a feeling for how researchers *call* their approaches - which will be very useful for future literature search.&lt;/li&gt;
&lt;li&gt;Starting with the last point: for every publication you read and find interesting: keep a complete reference of the publication in your reference program (e.g. JabRef). Complete means including the abstract and publication file (if possible). Also write a very short &quot;review&quot; of the paper yourself to later immediately remember what the paper was about (e.g. &quot;gives an overview of X with comparing approaches X1, X2 and X3&quot; or &quot;tries to solve problem X by using method Y. find out that [...]&quot;). E.g. bibtex provides a &quot;review&quot; tag for this matter.&lt;/li&gt;
&lt;li&gt;When read about something interesting in a publication that itself is cited there: jump to the reference list and grab the reference for further reading.&lt;/li&gt;
&lt;li&gt;When you find a paper X interesting, check if there exist newer papers that cite paper X. Those papers might be interesting to you as the might have done further progress in research, based on paper X.&lt;/li&gt;
&lt;/ul&gt;&lt;h3 class=&quot;header&quot;&gt;Where to search for papers&lt;/h3&gt;
&lt;p&gt;Use scientific search engines (&quot;online libraries&quot; for our sciences). Some libraries related to our sciences are listed below. Inside our university network you can download complete publications for most of those libraries (which is not possible outside the network - there you would have to pay for the access. Details on: &lt;a href=&quot;http://www.fh-ooe.at/campus-hagenberg/campus/bibliothek/digitale-bibliothek/datenbanken-an-der-fh-ooe/&quot; target=&quot;_blank&quot;&gt;http://www.fh-ooe.at/campus-hagenberg/campus/bibliothek/digitale-bibliot...&lt;/a&gt;).&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;scholar.google.com (very good as starting point)&lt;/li&gt;
&lt;li&gt;citeseerx.ist.psu.edu&lt;/li&gt;
&lt;li&gt;explore.ieee.org&lt;/li&gt;
&lt;li&gt;dl.acm.org&lt;/li&gt;
&lt;li&gt;sciencedirect.com&lt;/li&gt;
&lt;li&gt;citeulike.org&lt;/li&gt;
&lt;/ul&gt;&lt;h3 class=&quot;header&quot;&gt;How to effectively read a paper&lt;/h3&gt;
&lt;p&gt;Papers are almost always structured somehow similar to the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Title/Authors (most important: what is the paper in one sentence?)&lt;/li&gt;
&lt;li&gt;Abstract (second most important: what is done in the paper?)&lt;/li&gt;
&lt;li&gt;Introduction (what is the problem? - in detail)&lt;/li&gt;
&lt;li&gt;Related work (other research the authors are aware of when writing their publication. Good for further reading)&lt;/li&gt;
&lt;li&gt;Method / Approach (description and details how they address the problem)&lt;/li&gt;
&lt;li&gt;Implementation + Evaluation (practically proving and measuring the method to see &quot;how good it is&quot;)&lt;/li&gt;
&lt;li&gt;Conclusion (third most important: what was done in the paper?)&lt;/li&gt;
&lt;li&gt;References (corresponds to related work)&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;From the title decide if the paper seems related to your topic. If yes or if you are not sure about it: read the paper&#039;s abstract. Abstracts are short, therefore fast to read - and as for papers, abstracts are often structured similarly:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;What is the problem the authors address?&lt;/li&gt;
&lt;li&gt;Why is this problem important / why is it still unsolved / what are it&#039;s difficulties?&lt;/li&gt;
&lt;li&gt;Which approach do the authors propose? What do the authors therefore contribute to the research field?&lt;/li&gt;
&lt;li&gt;What is the method the authors use in their approach?&lt;/li&gt;
&lt;li&gt;How did they evaluate their problem?&lt;/li&gt;
&lt;li&gt;What are the evaluation results? What can be concluded from these results for the research field?&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;From a first skim of the abstract you should be able to decide if the paper targets your research area. If yes: read the abstract at least so carefully that you can roughly answer yourself the questions above. If you find the paper still to be interesting for you, skim through the conclusion. The conclusion essentially tells you what the authors did in the paper (so it&#039;s similar to the abstract, also in length - but written from the point of view that you *already read* the paper). When reading the conclusion you can re-check that your assumptions about the paper&#039;s content were correct. If the paper seems still interesting you can now start &quot;reading&quot; the paper. Skim through the introduction - if you already know about the problem the authors address in the publication in detail. If you do not yet, read it carefully to understand the details of the problem the authors want to address. Read through the related work to get an overview of the literature the authors were aware of when writing their publication. This is a good point to look out for other papers that are directly correlated to this paper for further reading. The sections from method to evaluation go into more detail on the approach the authors used to address the stated problem. Here, a &quot;good paper&quot; is written so that readers can fully reimplement and reevaluate the method - as it states all necessary details. Therefore, it is often sufficient if you dont&#039; understand everything in full detail (except you want to write about this exact approach, reimplement it etc.). But read the method at least so carefully that you can answer somebody else the question: how did the authors address the problem/what is their method? What were findings for their approach within the evaluation?&lt;/p&gt;
&lt;h4 class=&quot;header&quot;&gt;Write a very short review - in your own words&lt;/h4&gt;
&lt;p&gt;After finishing reading the paper state very short in your own words what the paper is about in your reference as a review (as stated, bibtex provides a &quot;review&quot; tag for this). This review is mainly for you to immediately remember what the paper is about/how they did what the did - without needing to re-read the whole paper.&lt;/p&gt;
&lt;h4 class=&quot;header&quot;&gt;Further reading - starting at this publication&lt;/h4&gt;
&lt;p&gt;Now, after having finished a paper X you found it interesting: if you would like to read futher, related publications (besides reading the related work cited in the paper) you can search for papers that cite paper X themselves. Those papers might be interesting as they might have further progressed in research based on the findings of paper X. To do so search for your paper on scientific search engines and look out for tabs like &quot;cited by&quot; or &quot;active bibliography&quot;.&lt;/p&gt;
&lt;h3 class=&quot;header&quot;&gt;Two more things&lt;/h3&gt;
&lt;p&gt;First: there exist multiple types of papers.&lt;br /&gt; Short paper: e.g. &amp;lt;=4 pages: a shorter version of a paper. Does not go in too much details, therefore often has less references or evaluation. Often the purpose is stating an idea.&lt;br /&gt; Paper: e.g 7-10 pages: &quot;normal&quot; paper, basically as described above.&lt;br /&gt; Article: longer and more comprehensive version of a paper. Describes the problem, related work and method in even more detail, does a extensive evaluation. Articles are often extended version of &quot;normal&quot; papers, so you might find a paper and an article describing the same thing - with the article being the more comprehensive publication.&lt;/p&gt;
&lt;p&gt;Second: how to estimate the quality of a paper you are reading?&lt;br /&gt; Be careful in case the paper seems completely unstructured or major parts are missing (e.g. there is basically no related work stated in the paper or the evaluation of the method is completely missing). It&#039;s often a hint of reduced quality if a paper contains many typos, formatting errors or if it has (as a non short paper) only a couple of references (not counting internet references). Usually normal papers have somewhere in the range of 10-30 references.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Tue, 17 Dec 2013 13:56:50 +0000</pubDate>
 <dc:creator>rainhard.findling</dc:creator>
 <guid isPermaLink="false">163 at </guid>
 <comments>/blog/how-to-get-your-thesis-topic-started#comments</comments>
</item>
<item>
 <title>Dr. Bulling talks on Pervasive Eye-Based Human-Computer Interfaces</title>
 <link>/blog/talk-on-pervasive-eye-based-human-computer-interfaces</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;Dr. Anreas Bulling (Max Planck Institute for Informatics, Germany) will give a guest talk about &quot;Pervasive Eye-Based Human-Computer Interfaces&quot; on the 8. of January 2014 at the University of Applied Sciences Upper Austria, School of Informatics, Communications &amp;amp; Media, Hagenberg Campus. The event is free and open to the public, no registration required!&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Date/Time:&lt;/strong&gt; &lt;br /&gt;08.01.2014, 10:30 - 11:30&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Location:&lt;/strong&gt; &lt;br /&gt;University of Applied Sciences Upper Austria&lt;br /&gt;School of Informatics,Communications and Media&lt;br /&gt;Softwarepark 11, 4232 Hagenberg/Austria&lt;br /&gt;&lt;a href=&quot;http://www-en.fh-ooe.at/hagenberg-campus&quot; target=&quot;_blank&quot;&gt;http://www-en.fh-ooe.at/hagenberg-campus&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Details:&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;http://www.fh-ooe.at/campus-hagenberg/aktuelles/fh-ooe-events-hagenberg/fh-ooe-events-hagenberg/article/guest-lecture-pervasive-eye-based-human-computer-interfaces-dr-andreas-bulling-saarland-univer/&quot; target=&quot;_blank&quot;&gt;http://www.fh-ooe.at/campus-hagenberg/aktuelles/fh-ooe-events-hagenberg/fh-ooe-events-hagenberg/article/guest-lecture-pervasive-eye-based-human-computer-interfaces-dr-andreas-bulling-saarland-univer/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Abstract:&lt;/em&gt; Recent years have seen considerable advances in mobile and stationary eye tracking equipment as well as automated eye movement analysis. However, previous work on computational methods and eye-based human-computer interfaces developed use of the eyes in traditional (&quot;desktop&quot;) settings that involved single user, single device and WIMP-style interactions. The vast majority of previous work also followed the &quot;gaze as a mouse replacement&quot; paradigm, i.e. the use of gaze information for explicit interaction. This is despite the fact that the eyes are involved in nearly everything that we do and therefore hold a lot (more) valuable information for interactive and context-aware systems.&lt;/p&gt;
&lt;p&gt;In his talk Dr. Bulling will first provide an introduction to the state-of-the-art in eye tracking and eye-based human-computer interaction. He will then motivate and describe a vision for the next generation of so-called pervasive eye-based user interfaces that continuously analyse and fully exploit the wealth of information contained in visual behaviour in all explicit and implicit interactions that users perform with computing systems throughout the day.&lt;br /&gt;In the second part of his talk he will show key examples of the previous and ongoing work in this emerging area of research.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Biography:&lt;/em&gt; Dr. Andreas Bulling is head (W2) of the Perceptual User Interfaces Group at the Max Planck Institute for Informatics and the Cluster of Excellence on Multimodal Computing and Interaction at Saarland University. He received his MSc. (Dipl.-Inform.) in Computer Science from the Technical University of Karlsruhe (TH), Germany, in 2006, focusing on embedded systems, robotics and biomedical engineering. He holds a PhD in Information Technology and Electrical Engineering from the Swiss Federal Institute of Technology (ETH) Zurich, Switzerland. Dr. Bulling was previously a Feodor Lynen Research Fellow and a Marie Curie Research Fellow in the Computer Laboratory at the University of Cambridge, United Kingdom, a postdoctoral research associate in the School of Computing and Communications at Lancaster University, United Kingdom, as well as a Junior Research Fellow at Wolfson College, Cambridge. Dr. Bulling served as co-chair, TPC member and reviewer for major conferences and journals as well as TPC co-chair for AugmentedHuman 2013, vice program chair for PerCom 2015, and associate chair for CHI 2013 and CHI 2014.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Thu, 12 Dec 2013 11:24:12 +0000</pubDate>
 <dc:creator>rainhard.findling</dc:creator>
 <guid isPermaLink="false">164 at </guid>
 <comments>/blog/talk-on-pervasive-eye-based-human-computer-interfaces#comments</comments>
</item>
<item>
 <title>Reference exporter: Jabref to RTF (Microsoft Word)</title>
 <link>/blog/jabref-to-rtf</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;If you need to use references in MS-Word, but usually work with Jabref and want to keep your references stored in a single place, you can use the Jabref to RTF export functionality shipped with Jabref. We&#039;ve created a demo for exporting Jabref references to (almost) fit the Harvard style required for the IJPCC (&lt;a href=&quot;http://www.emeraldinsight.com/products/journals/journals.htm?id=ijpcc&quot; target=&quot;_blank&quot;&gt;http://www.emeraldinsight.com/products/journals/journals.htm?id=ijpcc&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;How to create own layout files for .rtf export:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Download the jabref.jar from &lt;a href=&quot;http://jabref.sourceforge.net/download.php&quot; target=&quot;_blank&quot;&gt;http://jabref.sourceforge.net/download.php&lt;/a&gt; and extract the files in resource/layout/harvard (to only name one Jabref to .rtf-example)&lt;/li&gt;
&lt;li&gt;Manipulate those files to your needs - they are basically self explanatory. A list of keywords is available at &lt;a href=&quot;http://jabref.sourceforge.net/help/CustomExports.php&quot; target=&quot;_blank&quot;&gt;http://jabref.sourceforge.net/help/CustomExports.php&lt;/a&gt;, but unfortunately this list seems to be incomplete. You can further add new, not yet existing layout files (e.g. for manuals) - they get applied automatically if the type of publication in your .bib file matches.&lt;/li&gt;
&lt;/ol&gt;&lt;p&gt;How to include these files to Jabref to perform an export:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Jabref-&amp;gt;Options-&amp;gt;Manage custom exports-&amp;gt;Add new. The main layout file is the .layout file within the extracted layout files - without any publication type, such as article. The file extension is the export file extension, so &quot;rtf&quot; if you want to copy them to a MS-Word document later.&lt;/li&gt;
&lt;li&gt;Jabref-&amp;gt;File-&amp;gt;Export: chose your custom export here to finally perform the export.&lt;/li&gt;
&lt;/ol&gt;&lt;p&gt;You can download the demo exporter files here: &lt;a href=&quot;http://db.tt/NWVd3K2v&quot; target=&quot;_blank&quot;&gt;http://db.tt/NWVd3K2v&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Tue, 13 Aug 2013 15:05:22 +0000</pubDate>
 <dc:creator>rainhard.findling</dc:creator>
 <guid isPermaLink="false">98 at </guid>
 <comments>/blog/jabref-to-rtf#comments</comments>
</item>
</channel>
</rss>
