In an online experiment, I apply theory from psychology and communications to find out whether group information management tasks are governed by the same communication processes...
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
Continued device scaling enables microprocessors and other systems-on-chip (SoCs) to increase their performance, functionality, and hence, complexity. Simultaneously, relentless s...
Technology offers the potential to objectively monitor people‘s eating and activity behaviors and encourage healthier lifestyles. BALANCE is a mobile phone-based system for long...
Tamara Denning, Adrienne H. Andrew, Rohit Chaudhri...