—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
In this demo, we present GENIUS, a tool that facilitates research in the area of bilateral multi-issue negotiation. It implements an open architecture allowing easy development an...
Koen V. Hindriks, Catholijn M. Jonker, Sarit Kraus...
Deaf and hard of hearing students must juggle their visual attention in current classroom settings. Managing many visual sources of information (instructor, interpreter or caption...
Anna Carpenter Cavender, Jeffrey P. Bigham, Richar...
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...