In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
This paper presents thoughts to extend our understanding of bodily aspects of technology interactions. The aim of the paper is to offer a way of looking at the role our kinaesthet...
Astrid Twenebowa Larssen, Toni Robertson, Jenny Ed...
The project is working towards building an understanding of the personal interests and experiences of children with the aim of designing appropriate, usable and, most importantly,...
Dependence graphs and memoization can be used to efficiently update the output of a program as the input changes dynamically. Recent work has studied techniques for combining the...
Umut A. Acar, Guy E. Blelloch, Matthias Blume, Kan...
Currently there exist dozens of web controller frameworks that are incompatible, but at the same time have large portions of overlapping functionality that is implemented over and...