This essay adopts a formal model of play as semiosis [18] to explore the often dysfunctional role of backstories within computer game design and play. Within this model, backstori...
The problem of privacy-preserving record linkage is to find the intersection of records from two parties, while not revealing any private records to each other. Recently, group li...
Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, Peng ...
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Chip multiprocessors with multiple simpler cores are gaining popularity because they have the potential to drive future performance gains without exacerbating the problems of powe...
Hongtao Zhong, Steven A. Lieberman, Scott A. Mahlk...