We consider the combination of two ideas from the hashing literature: the power of two choices and Bloom filters. Specifically, we show via simulations that, in comparison with a...
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
—Computer Supported Collaborative Learning (CSCL) tool adoption is slow and challenging when compared to the dissemination of simpler content delivery systems. The lack of techni...
Location awareness is a key ingredient to many applications of mobile devices. Devices with the ability to determine their own position in space can retrieve, filter or present in...
Building visualization and analysis pipelines is a large hurdle in the adoption of visualization and workflow systems by domain scientists. In this paper, we propose techniques to ...
David Koop, Carlos Eduardo Scheidegger, Steven P. ...