Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
We studied files stored by members of a work organization for patterns of social commonality. Discovering identical or similar documents, applications, developer libraries, or oth...
John C. Tang, Clemens Drews, Mark Smith, Fei Wu, A...
We present two projects that facilitate collective music creativity over networks. One system is a participative social music system on mobile devices. The other is a collaborativ...
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
The convergence of the Internet and ubiquitous technologies offers an unprecedented level of convenience for information collection, accessing, and sharing through mobile devices ...