Today's rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed wi...
Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang,...
Over time, many people accumulate extensive email repositories that contain detailed information about their personal communication patterns and relationships. We present three vi...
We present a novel aging technique that simulates the deformation of an object caused by repetitive impacts over long periods of time. Our semi-automatic system deteriorates the s...
Trust has been explored by many researchers in the past as a solution for assisting the process of recommendation production. In this work we are examining the feasibility of build...
—Abbreviation Completion is a novel technique to improve the efficiency of code-writing by supporting code completion of multiple keywords based on non-predefined abbreviated inp...