— As firms increasingly rely on information systems to perform critical functions the consequences of software defects can be catastrophic. Although the software engineering lite...
Donald E. Harter, Chris F. Kemerer, Sandra Slaught...
We investigate the use of haptic feedback for enhancing user performance with remote pointing devices. We present a number of concepts that use haptic feedback on such devices and...
Laurens R. Krol, Dzmitry Aliakseyeu, Sriram Subram...
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
We propose the first single sign-on system in which a user can access services using unlinkable digital pseudonyms that can all be revoked in case she abuses any one service. Our ...