Handheld computing devices are becoming highly connected devices with high capacity storage. This has resulted in their being able to support storage of, and access to, personal p...
Cathal Gurrin, Gareth J. F. Jones, Hyowon Lee, Nei...
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
This paper reports on the results of studies of task management to support the design of a task list manager. We examined the media used to record and organize to-dos and tracked ...
Victoria Bellotti, Brinda Dalal, Nathaniel Good, P...
How is work created, assigned, and completed on large-scale, crowd-powered systems like Wikipedia? And what design principles might enable these federated online systems to be mor...
Michel Krieger, Emily Margarete Stark, Scott R. Kl...
We study the computational power of a distributed system consisting of simple autonomous robots moving on the plane. The robots are endowed with visual perception but do not have ...