Critical computing should include a concern for the everyday work practice of IT professionals. We explain our ‘micro-ethical view’, which shifts focus towards everyday work c...
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
—Radical change is needed in today’s organizations. While e-mail, instant messaging, wikis, prediction markets, and the like have proliferated across myriad sectors, the fundam...
Taemie Kim, Daniel Olguin Olguin, Benjamin N. Wabe...
Abstract—Increasing interest in sensor networking and ubiquitous computing has created a trend towards embedding more and more intelligence into our surroundings. This enables th...