Being mobile influences not only the types of information people seek but also the ways they attempt to access it. Mobile contexts present challenges of changing location and soci...
Timothy Sohn, Kevin A. Li, William G. Griswold, Ja...
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Situated, spontaneous speech may be ambiguous along acoustic, lexical, grammatical and semantic dimensions. To understand such a seemingly difficult signal, we propose to model th...
—This paper examines the motivation and concepts of dynamic encoders (for binary neural networks) introduced by Shah in the author’s RASC 2004 and 2006 conference papers [1], [...
Microcosm was an open hypertext system that evolved in the early 1990s, before the advent of the Web. Apart from its success as a research platform it was widely used for presenti...