In this SIG, we will present scenarios that exemplify many of the key challenges of doing user research and usability evaluation internationally. We will use these to stimulate di...
This paper gives an overview of the state of the art in the field of HCI (Human-Computer Interaction) and investigates the applicability of HCI research to the development of larg...
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
We are interested in the problem of validating the consistency of integrity constraints when data is modi ed. In particular, we consider how constraints can be checked with only p...
Jennifer Widom, Ashish Gupta, Yehoshua Sagiv, Jeff...