We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
This paper describes a qualitative study of how 11 Arab individuals use technology in the context of their longdistance romantic relationships. Our participants’ communication p...
We propose the "ninja cursor" to improve the performance of target acquisition, particularly on large screens. This technique uses multiple distributed cursors to reduce...
Cultural institutions increasingly see the need to play an important role in the lifelong learning of citizens. Recent trends, particularly in science museums, have been toward su...
We show how model extensibility of object-oriented data management systems can be achieved through the combination of a highlevel core object data model and an architecture designe...