With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
Expertise locator systems have been designed to help find experts within organizations. While there are many examples of these systems in the literature, there has not been any sy...
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
Threshold devices present information gathered from the home's surroundings to give new views on the domestic situation. We built two prototypes of different threshold device...
William W. Gaver, Andy Boucher, Andy Law, Sarah Pe...
Recent years have seen a growing interest in the role that narrative can play in learning. With the emergence of narrative-centered learning environments that engage students by d...
Scott W. McQuiggan, Jonathan P. Rowe, James C. Les...