We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Decision tree induction techniques attempt to find small trees that fit a training set of data. This preference for smaller trees, which provides a learning bias, is often justifie...
Christian Bessiere, Emmanuel Hebrard, Barry O'Sull...
This proposal describes the early phase of our design process developing a robot cell-phone named CALLY, with which we are exploring the roles of facial and gestural expressions o...
Single Display Groupware (SDG) solutions have been used to create software for disadvantaged children, particularly in the developing world. SDG allows for greater utilization of ...
Kurtis Heimerl, Divya Ramachandran, Joyojeet Pal, ...
We introduce a new interactive system: a game that is fun and can be used to create valuable output. When people play the game they help determine the contents of images by provid...