Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Abstract. Many existing localization systems generate location predictions, but fail to report how accurate the predictions are. This paper explores the effect of revealing the er...
David Dearman, Alex Varshavsky, Eyal de Lara, Khai...
We describe the design of privacy controls and feedback mechanisms for contextual IM, an instant messaging service for disclosing contextual information. We tested our designs on I...
Gary Hsieh, Karen P. Tang, Wai Yong Low, Jason I. ...
This paper addresses two problems: “What are the appropriate methods for evaluating information systems?” and “How do we measure the impact of ambient information systems?...
Xiaobin Shen, Peter Eades, Seok-Hee Hong, Andrew V...
This paper considers the application of a low-force robotic manipulator to guide a human user’s movement to locate a tool at a predetermined position or to move a tool along a p...