A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
With an ever-growing number of computers being embedded into our surroundings, the era of ubiquitous computing is approaching fast. However, as the number of networked devices incr...
Little treasures in nature often go unnoticed by visitors when roaming about in a national park. Ubiquitous technology with its less intrusive character may be apt to enhance this...
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...