We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Accurate modeling of delay, power, and area of interconnections early in the design phase is crucial for effective system-level optimization. Models presently used in system-level...
Luca P. Carloni, Andrew B. Kahng, Swamy Muddu, Ale...
Web applications facilitated by technologies such as JavaScript, DHTML, AJAX, and Flash use a considerable amount of dynamic web content that is either inaccessible or unusable by...
Yevgen Borodin, Jeffrey P. Bigham, Rohit Raman, I....
Research projects, assistive technology, and individuals all create metadata in order to improve Web accessibility for visually impaired users. However, since these projects are d...
Shinya Kawanaka, Yevgen Borodin, Jeffrey P. Bigham...
Proper use of headings in web pages can make navigation more efficient for blind web users by indicating semantic di visions in the page. Unfortunately, many web pages do not use ...
Jeremy T. Brudvik, Jeffrey P. Bigham, Anna Cavende...