In the traditional voting manipulation literature, it is assumed that a group of manipulators jointly misrepresent their preferences to get a certain candidate elected, while the ...
The bandwidth minimization problem has a long history and a number of practical applications. In this paper we introduce a natural extension of bandwidth to partially ordered layo...
Purpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the ...
—The hidden knowledge in social networks data can be regarded as an important resource for criminal investigations which can help finding the structure and organization of a crim...
This ethnographic study of 22 diverse families in the San Francisco Bay Area explores parents’ attitudes about their children’s use of technology. We found that parents from d...
Morgan G. Ames, Janet Go, Joseph Kaye, Mirjana Spa...