In this paper we show that financial information can be used to sense many aspects of human activity. This simple technique gives people information about their daily lives, is ea...
Julia Schwarz, Jennifer Mankoff, H. Scott Matthews
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
Technology arguably has the potential to play a key role in improving the lives of people in developing regions. However, these communities are not well understood and designers m...
Divya Ramachandran, Matthew Kam, Jane Chiu, John F...
We present Koala, a system that enables users to capture, share, automate, and personalize business processes on the web. Koala is a collaborative programming-bydemonstration syst...
Greg Little, Tessa A. Lau, Allen Cypher, James Lin...