This paper borrows ideas from social science to inform the design of novel "sensing" user-interfaces for computing technology. Specifically, we present five design chall...
Victoria Bellotti, Maribeth Back, W. Keith Edwards...
The study of hashing is closely related to the analysis of balls and bins; items are hashed to memory locations much as balls are thrown into bins. In particular, Azar et. al. [2] ...
— In this paper, we propose a new framework for the study of cellular networks called the fluid model and we derive from this model analytical formulas for interference, outage ...
Jean Marc Kelif, Marceau Coupechoux, Philippe Godl...
Abstract— Extending network lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributive nodes in wireless sensor ...
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical analysis suggests that DAS supports an overall password space larger than that of the ubiqu...