Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
This paper describes an approach to managing tasks and processes that are distributed across a large number of people. The basic idea is to use a social visualization called a tas...
Thomas Erickson, Wei Huang, Catalina Danis, Wendy ...
We present a taxonomy for local distance functions where most existing algorithms can be regarded as approximations of the geodesic distance defined by a metric tensor. We categor...
Performance prediction and measurement approaches for component-based software systems help software architects to evaluate their systems based on component performance specificat...
This paper presents the first in-depth evaluation of a large multi-format virtual conference. The conference took place in an avatar-based 3D virtual world with spatialized audio,...
Thomas Erickson, N. Sadat Shami, Wendy A. Kellogg,...