We consider manipulation problems when the manipulator only has partial information about the votes of the nonmanipulators. Such partial information is described by an information...
Standard algorithms for template-based information extraction (IE) require predefined template schemas, and often labeled data, to learn to extract their slot fillers (e.g., an ...
Explicitly examining the values held by a research community provides a tool in which participants can define its culture, conduct informed research, and reflect on their design p...
Svetlana Yarosh, Iulian Radu, Seth Hunter, Eric Ro...
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
We present a finger-tracking system for touch-based interaction which can track 3D finger angle in addition to position, using low-resolution conventional capacitive sensors, th...
Simon Rogers, John Williamson, Craig Stewart, Rode...