Many systems – such as map viewers or visual editors – provide a limited viewport onto a larger graphical workspace. The limited viewport means that users often have to navigat...
Pourang Irani, Carl Gutwin, Grant Partridge, Mahta...
The primary goal of the project was to understand the cultural similarities and differences in perception, adoption and usage of technology across three cultures (US, India and Ch...
A perfect hash function (PHF) is an injective function that maps keys from a set S to unique values, which are in turn used to index a hash table. Since no collisions occur, each k...
Fabiano C. Botelho, Hendrickson R. Langbehn, Guilh...
Abstract. Consider a system composed of n sensors operating in synchronous rounds. In each round an input vector of sensor readings x is produced, where the i-th entry of x is a bi...
Florent Becker, Sergio Rajsbaum, Ivan Rapaport, Er...
The 2002 SIGCOMM Workshop on Educational Challenges for Computer Networking [Kur02a] exposed many issues related to teaching computer networking with the need for a laboratory in ...
Michael Erlinger, Mart Molle, Titus Winters, Chris...