Abstract. We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the securit...
Our study on a community of knowledge management (KM) practitioners in the aerospace industry reveals challenges in the dissemination of KM concepts and tools. In this paper, we i...
Hiroko Wilensky, David F. Redmiles, Norman Makoto ...
Mischief is a system for classroom interaction that allows multiple children to use individual mice and cursors to interact with a single large display [20]. While the system can ...
Neema Moraveji, Kori Inkpen, Ed Cutrell, Ravin Bal...
In this study we demonstrate that touch decreases the ambiguity in a visual image. It has been previously found that visual perception of three-dimensional shape is subject to cer...
Maarten W. A. Wijntjes, R. Volcic, Sylvia C. Pont,...
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...