Abstract— We consider communication over the Gaussian multiple access channel (MAC) with unknown set of active users. The proposed multiple access strategy is distributed and ach...
Urs Niesen, Uri Erez, Devavrat Shah, Gregory W. Wo...
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
This research aims to investigate a collection of interactions in 2D workspaces with the goal of helping users stay in the flow of their activity. These interactions will be explo...
In this paper, following the IT acceptance theory framework, we analyze factors that affect users' acceptance of micro-blogging in a large corporate environment. We categoriz...
: This paper develops a design case format capable of engaging design practitioners and design students in reflective dialog about their user centred design practice. The core idea...