Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
Consider a database most of whose entries are marked but the precise fraction of marked entries is not known. What is known is that the fraction of marked entries is 1 − , where ...
Abstract. This paper presents Textable Movie, an open-ended interface that allows anyone to become "video-jockey." In the framework of computational storytelling, Textabl...
Overlapping generations are extracting a natural resource over an infinite future. We examine fair allocation of resource and compensations among generations. Fairness is define...
If models can be true, where is their truth located? Giere (e.g. 1988) has suggested an account of theoretical models on which models themselves are not truth-valued. The paper su...