This article presents a rational model developed under the distributed cognition framework that explains how social tags influence knowledge acquisition and adaptation in explorat...
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
This paper begins with an overview of the boundary condition capturing approach to solving problems with interfaces. Although, the authors’ original motivation was to extend the...
The goal of document image analysis is to produce interpretations that match those of a uent and knowledgeable human when viewing the same input. Because computer vision technique...
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...