Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
The effectiveness of support provided to virtual communities depends strongly on what we know about a particular community of people and in what areas the community needs support....
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
We develop a model of golfer putting skill and combine it with physics-based putt trajectory and holeout models to study the impact of doubling the radius of the hole on the putti...
We describe a computer program to assist a clinician with assessing the e cacy of treatments in experimental studies for which treatment assignment is random but subject complianc...