There can often be a gap between theory and its implications for practice in human-behavioral studies. This gap can be particularly significant outside psychology departments. Most...
Frank E. Ritter, Jong W. Kim, Jonathan H. Morgan, ...
This paper looks at existing computer games and virtual environments from the perspective of film theory and practice. From this, we will draw conclusions about the ways in which ...
Abstract. In small-world networks, each peer is connected to its closest neighbors in the network topology, as well as to additional long-range contact(s), also called shortcut(s)....
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...