We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
Tactile icons (Tactons) are structured vibrotactile messages which can be used for non visual information display. Information is encoded in Tactons by manipulating vibrotactile p...
Lorna M. Brown, Stephen A. Brewster, Helen C. Purc...
In this paper, we present a study of `minimal intimate objects': low bandwidth devices for communicating intimacy for couples in long-distance relationships. We describe a us...
Joseph Kaye, Mariah K. Levitt, Jeffrey Nevins, Jes...
This research investigates how the pervasive use of technology by an individual in the physical presence of group members affects community level. When technology use occurs, the ...
Monitoring extreme values (MAX or MIN) is a fundamental problem in wireless sensor networks (and in general, complex dynamic systems). This problem presents very different algorit...