In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Video games are varied, with vastly different visual layouts and interaction styles; however, most games that share a common genre still have many user interface similarities. The...
Eye-typing performance results are reported from controlled studies comparing an on-screen keyboard and EyeWrite, a new on-screen gestural input alternative. Results from the firs...
Jacob O. Wobbrock, James Rubinstein, Michael W. Sa...
Abstract— There are many applications where a timely response to an important event is needed. Often such response can require significant computation and possibly communication...
Methods for automatically managing the performance of computing services must estimate a performance model of that service. This paper explores properties that are necessary for p...