Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
—In this paper, we propose a novel concept of Ubiquitous Virtual Reality (U-VR) and examine technical challenges to be required for realizing it. It is difficult to realize Virtu...
Youngjung Suh, Kiyoung Kim, JoungHyun Han, Woontac...
Traditionally work on multimedia structuring has been centered on the creation of indices and their use for searching. Although searching is important there are many cases where t...
The popularity of micro-blogging has made generalpurpose information sharing a pervasive phenomenon. This trend is now impacting location sharing applications (LSAs) such that use...
Karen P. Tang, Jialiu Lin, Jason I. Hong, Daniel P...
Wireless network researchers are seriously starved for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, a Community R...