Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Providing instructions via handheld prompters holds much promise for supporting independence for persons with cognitive disabilities. Because users of these tools are paired ? car...
Despite the widespread use of technology for social communication across distance, a number of barriers to such contact still exist. One such barrier is the problem of communicati...
This is a critical design paper offering a possible scenario of use intended to provoke reflection about values and politics of design in persuasive computing. We describe the des...
Stephen Purpura, Victoria Schwanda, Kaiton William...
Abstract. A class of probabilistic-logic models is considered, which increases the expressibility from HMM's and SCFG's regular and contextfree languages to, in principle...