Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
The growing processor/memory performance gap causes the performance of many codes to be limited by memory accesses. If known to exist in an application, strided memory accesses fo...
Tushar Mohan, Bronis R. de Supinski, Sally A. McKe...
Achieving sufficient execution performance is a challenging goal of software development. Unfortunately, violating performance requirements is often revealed at a late stage of th...
We present the see-Puck, a round display module that extends an open robot platform, the e-Puck. It holds 148 LEDs (light emitting diodes) to enable the presentation of eye-catchi...
Mattias Jacobsson, Johan Bodin, Lars Erik Holmquis...
This paper investigates emergent practices around `microblogging', changing and sharing status within a social group. We present results from a trial of `Connecto', a ph...
Louise Barkhuus, Barry Brown, Marek Bell, Scott Sh...