We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
In this paper we propose a 3-step method for designing emotionally rich interactions, illustrated by the design of an alarm clock. By emotionally rich interaction we understand in...
Stephan Wensveen, Kees Overbeeke, J. P. Djajadinin...
All I Really Need to Know I Learned in Kindergarten By Robert Fulghum (Fulghum 1988) Share everything. Play fair. Don't hit people. Put things back where you found them. Clea...
By expanding the teaching styles used in computer science classrooms, we can expand the audience of students that enjoy and excel in technology. Rather than focusing on major curr...