A typical consent dialog was shown in 2×2×3 experimental variations to 80,000 users of an online privacy tool. We find that polite requests and button texts pointing to a volun...
A new software tool for user-interface development and assessment of ubiquitous computing applications is available for CHI researchers. The software permits researchers to use co...
Stephen S. Intille, John Rondoni, Chuck Kukla, Isa...
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Efficient and fair resource allocation associated with congestion control in multi-hop cognitive radio networks (CRN) is a challenging problem. In this paper, we consider their mu...
—Multi-core technology is becoming the mainstream of processor architecture. It is a great challenge for universities to offer students new theories because of the continuous cha...