Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
In this paper, we present ThumbSpace, a software-based interaction technique that provides general one-handed thumb operation of touchscreenbased mobile devices. Our goals are to p...
The presence of Network Address Translation (NAT) is a hindrance when accessing services within home networks, because NAT breaks the end-to-end connectivity model of the Internet ...
This paper describes a novel browsing paradigm, taking benefit of the various types of links (e.g. thematic, temporal, references, etc.) that can be automatically built between mul...
We investigate the performance of the IEEE 802.11e while emphasizing on the end-to-end delay performance. In our MAC delay analysis, we are based on elementary conditional probabi...
Ioannis Papapanagiotou, John S. Vardakas, Georgios...