We describe two games in which online participants collaborated with mobile participants on the city streets. In the first, the players were online and professional performers wer...
Martin Flintham, Steve Benford, Rob Anastasi, Terr...
In earlier work we proposed a way for a Web server to detect connectivity information about clients accessing it in order to take tailored actions for a client request. This paper...
Balachander Krishnamurthy, Yin Zhang, Craig E. Wil...
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Current methods to represent system or task usability in a single metric do not include all the ANSI and ISO defined usability aspects: effectiveness, efficiency & satisfactio...
This paper presents a new pooling method for constructing the assessment sets used in the evaluation of retrieval systems. Our proposal is based on RankBoost, a machine learning v...