We address the problem of answering broad-topic queries on the World Wide Web. We present a link based analysis algorithm SelHITS, which is an improvement over Kleinberg's HI...
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
Fashion signals are displayed to indicate access to information. Consistent, timely, and meaningful signal displays are only made possible if one is well-connected. While fashion ...
Multiple-monitor computer configurations significantly increase the distances that users must traverse with the mouse when interacting with existing applications, resulting in inc...
In this paper we describe an experiment designed to investigate the importance of eye gaze in humanoid avatars representing people engaged in conversation. We compare responses to...
Maia Garau, Mel Slater, Simon Bee, Martina Angela ...