Interaction patterns are becoming an important method for bridging the gap between analysis and design in user-centered design. Recent studies, however, have indicated problems in...
Though exciting scientifically, autonomous agent design can result in legal liability. This paper surveys those legal concerns, focusing on issues arising from the unique qualitie...
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
This note discusses the design of an experimental API (application program interface) for vocal user interfaces. The emphasis is on component design which supports vocal interactio...
Abstract. We construct the first O(1)-size designated confirmer signatures (DCS) with security in the state-of-the-art model of Camenisch and Michels, Eurocrypt 2000, without rando...