—The majority of the existing ad hoc wireless network routing protocols has a tendency to use the shortest single path from the source to the destination. However, in constantly ...
User interfaces for modern applications must support a rich set of interactive features. It is commonplace to find applications with dependencies between values manipulated by us...
In this paper, we describe the design and ethnographic study of a phone developed so as to allow people to glance at each other, rather than simply message or voice call. Glanceph...
The paper discusses the use of electronic publishing for the preservation and dissemination of rare manuscript material. It is based both upon the authors’ earlier work on multi...
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...