We describe a framework of bootstrapped hypothesis testing for estimating the confidence in one web search engine outperforming another over any randomly sampled query set of a gi...
Eric C. Jensen, Steven M. Beitzel, Ophir Frieder, ...
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
Testing and debugging database software is often challenging and time consuming. A very arduous task for DB testers is finding a min-repro ? the "simplest possible setup"...
In this paper, we describe “The Other Brother”, a semiautonomous device that captures images and video of spontaneous moments in the course of everyday life. It was our goal t...
Family and friends naturally maintain an awareness of each other on an ongoing basis (e.g., knowing one’s schedule, health issues) and many technologies are now being contemplat...