—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
We report on our experiences of introducing an instant messaging and group chat application into geographically distributed workgroups. We describe a number of issues we encounter...
James D. Herbsleb, David L. Atkins, David G. Boyer...
Data reduction has long been a method for adaptation to limited computational and network resources. But one major concern is the tradeoff between preserving visual quality and re...
The paper describes a framework supporting the creation of 3D user interfaces to visualize awareness information about the cooperation context of distributed actors. The paper dis...
Vivid agents [48] are software-controlled systems whose state comprises the mental components of knowledge, perceptions, tasks, and intentions, and whose behaviour is represented ...