Information retrieval or search plays an important role in a wide range of information management and electronic commerce tasks. In spite of the importance of information retrieva...
Nicholas J. Belkin, Susan T. Dumais, Jean Scholtz,...
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
We present findings of an observational study investigating how young children interact with augmented reality story books. Children aged between 6 and 7 read and interacted with o...