The development of public libraries may have inadvertently brought the age of marginalia to a close but the advent of digital libraries could revive the practice of marginal annot...
While previous work has studied bloggers' practices with respect to negotiating privacy, little research has been done on blog readers' perceptions of privacy. This post...
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
People often use computers other than their own to browse the web, but blind web users are limited in where they access the web because they require specialized, expensive program...
The increasing popularity of personal reading devices raises the question of how best to support so-called active reading, which involves acts like annotation, note taking, etc. P...