User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. Various forms of countermeasures try to mitigate the negative effects caused b...
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
We introduce a system that allows four users to each receive sound from a private audio channel while using a shared tabletop display. In order to explore how private audio channe...
Meredith Ringel Morris, Dan Morris, Terry Winograd
In this paper, we introduce a system named Argo which provides intelligent advertising made possible from users’ photo collections. Based on the intuition that user-generated ph...
Xin-Jing Wang, Mo Yu, Lei Zhang, Rui Cai, Wei-Ying...
Through as an important part of service-oriented system architecture, service retrieval receives much attention from industry and academia and many methods have been proposed, the...
Bin Tang, Leqiu Qian, Ruzhi Xu, Yunjiao Xue, Hui T...