Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
We introduce the information flaneur as a new human-centred view on information seeking that is grounded in interdisciplinary research. We use the metaphor of the urban flaneur ...
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...
The management of group context in socially mediating technologies is an important challenge for the design community. To better understand how users manage group context, we expl...
We present a design methodology for specifying embedded systems that addresses the complex nature of embedded systems design. Our approach uses modern model-based techniques to co...