Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
The problem of partner finding is to identify which entities (agents) can provide requested services from a group of entities. It can be found in open and distributed environment...
In STOC’05, Ahn, Hopper and Langford introduced the notion of covert computation. A covert computation protocol is one in which parties can run a protocol without knowing if oth...
— In a wireless network (WN), the wireless devices generally localize themselves with the help of anchors that are pre-deployed in the network. Some of the techniques commonly us...
: We here report on a study exploring the use of augmented books for early literacy education. Children aged 6-7 interacted alone and in pairs with an AR-book. The study was iterat...