In examine the tutoring protocols of one expert human tutor tutoring 10 students in solving physics problems, four analyses reveal that he tutored the five good learners in differe...
We study security amplification for weak bit-commitment schemes and improve the efficiency of (black-box) transformations in both the information-theoretic and computational setti...
Electronic documents such as PDFs are becoming increasingly popular as we move further towards the notion of the paperless office. The harsh truth however is that e-documents diff...
Designing for a supple interaction, involving users bodily and emotionally into a ‘dance’ with a system is a challenging task. Any break-ups in interaction become fatal to the...
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...