Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
A federated database is comprised of multiple interconnected database systems that primarily operate independently but cooperate to a certain extent. Global integrity constraints c...
: Many industries are shifting from mass production to mass customization, which demands quick response to the needs of individual customers with high quality and low costs. The de...
In this paper we describe a field trial designed to investigate the potential of remote, situated messaging within the home. Five households used our “HomeNote” device for app...
Abigail Sellen, Richard H. R. Harper, Rachel Eardl...
The focus of this panel will be on aging and technology. The intent is to demonstrate how technology can be used to help older adults remain independent, productive and connected ...
Herman Bouma, Sara J. Czaja, Hiroyuki Umemuro, Wen...