Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
In studies of virtual teams, it is difficult to determine pure effects of geographic isolation and uneven communication technology. We developed a multi-agent computer model in Ne...
Ning Nan, Erik W. Johnston, Judith S. Olson, Natha...
CN4011A is IEEE 1394a_2000 standard Compliant Physical Layer ASIC. It is a 0.18um mixed-signal ASIC incorporating three analog ports, PLL, reference generator for analog along wit...
We present a new interaction technique to simulate textures in desktop applications without a haptic interface. The proposed technique consists in modifying the motion of the curs...
We present an image guided pen-based suggestive interface for sketching 3D wireframe models. Rather than starting from a blank canvas, existing 2D images of similar objects serve ...
Steve Tsang, Ravin Balakrishnan, Karan Singh, Abhi...