As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
- Robot companions need to be able to constantly acquire knowledge about new objects for instance in order to detect them in the environment. This ability is necessary since it is ...
This paper reports on the evaluation of a digitallyaugmented exhibition on the history of modern media and our experiences with the methodic approach employed. As a central elemen...
We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on ...
Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea...