In this paper, we address the pair-activity classification problem, which explores the relationship between two active objects based on their motion information. Our contributions...
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
Various performing arts increasingly employ projection screens and other information displays as essential elements of the show. We present some possibilities and lessons learned ...
This paper presents the findings of an exploratory, qualitative study revealing computing instructors’ experience in adopting curriculum innovations. We interviewed eight instru...