Complexity is the core problem of contemporary information technology, as the "artificial complicatedness" of its artefacts is exploding. Intellectually easy and economic...
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes running on the same device. While embedded operati...
Herwin Chan, Patrick Schaumont, Ingrid Verbauwhede
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
: When technologies are introduced into collaborative settings, people are often required to work together in new, unfamiliar ways. This can lead to problems of resistance, and eve...
John Halloran, Yvonne Rogers, Tom Rodden, Ian Tayl...
: Question answering systems have proven to be helpful to users because they can provide succinct answers that do not require users to wade through a large number of documents. How...
Jimmy J. Lin, Dennis Quan, Vineet Sinha, Karun Bak...