—Today’s enterprise data centers are shifting towards a utility computing model where many business critical applications share a common pool of infrastructure resources that o...
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
Abstract. This paper presents markerClock, a communication appliance embedded into a clock and designed for seniors as a simple and intuitive device. MarkerClock enhances seniorsâ€...
This paper introduces techniques for the exploration of images augmented with additional information. We present the so-called Meta-Previewer and propose the Cascading-Views which ...
Abstract. In the design of behavior-based control architectures for robots it is common to use biology as inspiration, and often the observed functionalities of insect behaviors ar...