As user-created content increasingly becomes an ever more prominent element of modern game design, tools have been developed to aide in the creative process for several forms of d...
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
We explore an alternative approach to spam based on economic rather than technological or regulatory screening mechanisms. We employ a model of email value which supports two intu...
This paper reports the value of On the Spot Experiments with self-produced content and the use of technology within healthcare. On the Spot Experiments are experiments conducted i...