Location-enhanced applications use the location of people, places, and things to augment or streamline interaction. Location-enhanced applications are just starting to emerge in s...
In this paper, we explore the concept of dual–purpose speech: speech that is socially appropriate in the context of a human– to–human conversation which also provides meanin...
Kent Lyons, Christopher Skeels, Thad Starner, Corn...
In this paper, we describe the YeTi information sharing system that has been designed to foster community building through informal digital content sharing. The YeTi system is a g...
Toshiya Yamada, Jun Shingu, Elizabeth F. Churchill...
We present a variant of hierarchical marking menus where items are selected using a series of inflection-free simple marks, rather than the single "zig-zag" compound mar...
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...