The wearable computer that can understand the context of human life and communicate autonomously with various electronic media in a ubiquitous computing environment would be very ...
We describe Social Net, a novel interest-matching application that uses patterns of collocation, over time, to infer shared interests between users. Social Net demonstrates new po...
Michael A. Terry, Elizabeth D. Mynatt, Kathy Ryall...
Sawtooth (2009) is an artwork integrating performance, sound, and animation. This paper describes the design of Sawtooth, with particular reference to the balances it strikes betw...
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...