Computer science has served to insulate programs and programmers from knowledge of the underlying mechanisms used to manipulate information, however this fiction is increasingly h...
Neil Gershenfeld, David Dalrymple, Kailiang Chen, ...
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
Due to the profile of strengths and weaknesses indicative of autism spectrum disorders (ASD), technology may play a key role in ameliorating communication difficulties with this p...
Joshua M. Hailpern, Karrie Karahalios, James Halle...
PowerUp is a multi-player virtual world educational game with a broad set of accessibility features built in. This paper considers what features are necessary to make virtual worl...
Shari Trewin, Vicki L. Hanson, Mark Laff, Anna Cav...
In this paper we investigate the classification of mental tasks based on electroencephalographic (EEG) data for Brain Computer Interfaces (BCI) in two scenarios: off line and on-l...