216,457 results
Search Results
2. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
- Author
-
David Gerault
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Bounding overwatch ,Computer science ,Short paper ,Terrorism ,Rfid authentication ,Key (cryptography) ,ComputingMilieux_COMPUTERSANDSOCIETY ,Adversary ,Gas meter prover ,Computer security ,computer.software_genre ,computer - Abstract
Terrorist fraud is an attack against distance bounding protocols, whereby a malicious prover allows an adversary to authenticate on their behalf without revealing their secret key. In this paper, we propose new attack strategies that lead to successful terrorist frauds on proven-secure protocols.
- Published
- 2021
- Full Text
- View/download PDF
3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption
- Author
-
L. Jean Camp, Sanchari Das, and Andrew Kim
- Subjects
Authentication ,Knowledge management ,Work (electrical) ,business.industry ,Computer science ,Short paper ,Control (management) ,Organizational security ,Survey data collection ,Multi-factor authentication ,business ,Security awareness - Abstract
Multi-factor authentication (MFA) is a useful measure for strengthening authentication. Despite its security effectiveness, the adoption of MFA tools remains low. To create more human-centric authentication solutions, we designed and evaluated the efficacy of a risk-reduction-based incentivization model and implemented our proposed model in a large-scale organization with more than 92, 025 employees, and collected survey data from 287 participants and interviewed 41 participants. We observed negative perceptions and degraded understandings of MFA technology due to the absence of proper risk and benefit communication in the control group. Meanwhile, the experimental group employees showed positive perceptions of MFA use for their work and personal accounts. Our analysis and implementation strategy are critical for reducing users’ risks, creating positive security tool usage experiences, and motivating users to enhance their security practices.
- Published
- 2021
- Full Text
- View/download PDF
4. Paper Creative Limited v. Orient Star Transporting LLTD. et al
- Author
-
Martin Davies and Jiang Lin
- Published
- 2022
- Full Text
- View/download PDF
5. China Shipping Container Lines Co., Ltd. v. Zhejiang Guangming Paper Co., Ltd. et al
- Author
-
Martin Davies and Jiang Lin
- Published
- 2022
- Full Text
- View/download PDF
6. Short Paper: Ballot Secrecy for Liquid Democracy
- Author
-
Nan Yang, Jeremy Clark, and Mahdi Nejadgholi
- Subjects
Ballot ,Secret ballot ,Delegate ,Computer science ,Presumption ,media_common.quotation_subject ,Secrecy ,Direct democracy ,Voter fatigue ,Democracy ,Law and economics ,media_common - Abstract
Certain advances in election technology, such as online voting, promise to reduce the administrative overhead of running an election. This has breathed new life into the idea of direct democracy, where voters play a more active role in setting legislation. However it is anticipated that a steady stream of referendums would generate voter fatigue. To combat this fatigue, voters could be allowed to delegate their votes to other (more knowledgeable) voters. This idea is old but has been recently reinvented under the name liquid democracy. In this paper, we consider how ballot secrecy should be defined for liquid democracy. We first show that a natural definition of full secrecy leads to several undesirable outcomes. We then show that these are very difficult to address without enabling voter coercion and vote buying. The purpose of the paper is not to affirm liquid democracy; rather, it is to raise awareness of unseen complexity hiding under our initial presumption that liquid democracy could effortlessly support a secret ballot.
- Published
- 2021
- Full Text
- View/download PDF
7. Geometric Figures on Grid Paper
- Author
-
Heinz Klaus Strick
- Subjects
Discrete mathematics ,Computer science ,Grid - Abstract
In this chapter, we will first deal with rectangles on grid paper, which we will then modify step-by-step. Then we are going to explore an easy way of calculating the area of figures whose vertices lie on grid points.
- Published
- 2021
- Full Text
- View/download PDF
8. Hostile Blockchain Takeovers (Short Paper)
- Author
-
Joseph Bonneau
- Subjects
Blockchain ,Computer science ,Process (engineering) ,05 social sciences ,Short paper ,Face (sociological concept) ,02 engineering and technology ,Adversary ,Computer security ,computer.software_genre ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,Protocol (object-oriented programming) ,050203 business & management - Abstract
Most research modelling Bitcoin-style decentralised consensus protocols has assumed profit-motivated participants. Complementary to this analysis, we revisit the notion of attackers with an extrinsic motivation to disrupt the consensus process (Goldfinger attacks). We outline several routes for obtaining a majority of decision-making power in the consensus protocol (a hostile takeover). Our analysis suggests several fundamental differences between proof-of-work and proof-of-stake systems in the face of such an adversary.
- Published
- 2019
- Full Text
- View/download PDF
9. Short Paper: Debt Representation in UTXO Blockchains
- Author
-
Michael Chiu and Uros Kalabic
- Subjects
Flexibility (engineering) ,Microeconomics ,Transparency (market) ,Loan ,Computer science ,Debt ,media_common.quotation_subject ,Aggregate (data warehouse) ,Scalability ,Reverse mortgage ,Representation (mathematics) ,media_common - Abstract
We provide a UTXO model of blockchain transactions that is able to represent both credit and debt on the same blockchain. Ordinarily, the UTXO model is solely used to represent credit and the representation of credit and debit together is achieved using the account model because of its support for balances. However, the UTXO model provides superior privacy, safety, and scalability when compared to the account model. In this work, we introduce a UTXO model that has the flexibility of balances with the usual benefits of the UTXO model. This model extends the conventional UTXO model, which represents credits as unmatched outputs, by representing debts as unmatched inputs. We apply our model to solving the problem of transparency in reverse mortgage markets, in which some transparency is necessary for a healthy market but complete transparency leads to adverse outcomes. Here the pseudonymous properties of the UTXO model protect the privacy of loan recipients while still allowing an aggregate view of the loan market. We present a prototype of our implementation in Tendermint and discuss the design and its benefits.
- Published
- 2021
- Full Text
- View/download PDF
10. White Paper on Joint Replacement
- Author
-
Hans-Holger Bleß and Miriam Kip
- Subjects
musculoskeletal diseases ,medicine.medical_specialty ,Joint replacement ,business.industry ,medicine.medical_treatment ,MEDLINE ,Osteoarthritis ,medicine.disease ,Arthroplasty ,Hip arthroplasty ,medicine.anatomical_structure ,White paper ,medicine ,Physical therapy ,business ,Femoral neck - Abstract
This open access White Paper details the status of hip and knee arthroplasty care in Germany. Hip and knee replacements are amongst the most frequently performed procedures and usually become necessarily due to age-related wear of the joint, osteoarthritis and fractures of the femoral neck. In light of demographic change, demands with regard to standards of care and the procedures are likely to rise.
- Published
- 2018
- Full Text
- View/download PDF
11. Estimating Profitability of Alternative Cryptocurrencies (Short Paper)
- Author
-
Danny Yuxing Huang, Kirill Levchenko, and Alex C. Snoeren
- Subjects
Market capitalization ,Cryptocurrency ,Opportunity cost ,Computer science ,Financial economics ,Short paper ,020206 networking & telecommunications ,02 engineering and technology ,Work (electrical) ,Digital currency ,0202 electrical engineering, electronic engineering, information engineering ,Liberian dollar ,020201 artificial intelligence & image processing ,Profitability index - Abstract
Digital currencies have flourished in recent years, buoyed by the tremendous success of Bitcoin. These blockchain-based currencies, called altcoins, are associated with a few thousand to millions of dollars of market capitalization. Altcoins have attracted enthusiasts who enter the market by mining or buying them, but the risks and rewards could potentially be significant, especially when the market is volatile. In this work, we estimate the potential profitability of mining and speculating 18 altcoins using real-world blockchain and trade data. Using opportunity cost as a metric, we estimate the mining cost for an altcoin with respect to a more popular but stable coin. For every dollar invested in mining or buying a coin, we compute the potential returns under various conditions, such as time of market entry and hold positions. While some coins offer the potential for spectacular returns, many follow a simple bubble-and-crash scenario, which highlights the extreme risks—and potential gains—in altcoin markets.
- Published
- 2018
- Full Text
- View/download PDF
12. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)
- Author
-
Ben Smyth, Elizabeth A. Quaglia, and Maxime Meyer
- Subjects
Subscriber identity module ,021110 strategic, defence & security studies ,Service (systems architecture) ,business.industry ,Computer science ,Short paper ,0211 other engineering and technologies ,020207 software engineering ,Provisioning ,02 engineering and technology ,Adversary ,law.invention ,law ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Architecture ,business ,Computer network - Abstract
GSMA is developing and standardizing specifications for embedded SIM cards with remote provisioning, called eUICCs, which are expected to revolutionize the cellular network subscription model. We study GSMA’s “Remote Provisioning Architecture for Embedded UICC” specification, which focuses on M2M devices, and we analyze the security of remote provisioning. Our analysis reveals weaknesses in the specification that would result in eUICCs being vulnerable to attacks: we demonstrate how a network adversary can exhaust an eUICC’s memory, and we identify three classes of attacks by malicious insiders that prevent service. We disclosed our findings to GSMA; GSMA confirmed the validity of these attacks and acknowledged their potential to disrupt the cellular industry. We propose fixes, which GSMA is incorporating into its specification. Thus, we improve security of next generation telecommunication networks.
- Published
- 2018
- Full Text
- View/download PDF
13. A Practical Guide to Writing (and Understanding) a Scientific Paper: Clinical Studies
- Author
-
Pietro Randelli, Corrado Bait, Riccardo Compagnoni, Kristian Samuelsson, Alberto Grassi, Alessandra Menon, and Stefano Zaffagnini
- Subjects
Medical education ,Medical knowledge ,Process (engineering) ,education ,Psychology ,Patient care - Abstract
Writing a scientific paper is a relevant part of the activities of medical doctors and is increasingly important for the progress of medical knowledge. Clinical outcomes can only be improved through research, education, and patient care. All these experiences are shared with the global community, primarily through peer-reviewed research papers, systematic review articles, and meta-analyses. Considering that not that much time is spent on training medical students to write a research manuscript, it, however, appears to be an intimidating process for many medical doctors.
- Published
- 2019
- Full Text
- View/download PDF
14. How to Prepare a Paper Presentation?
- Author
-
Timothy Lording and Jacques Menetrey
- Subjects
Structure (mathematical logic) ,Presentation ,Work (electrical) ,Anticipation (artificial intelligence) ,media_common.quotation_subject ,Premise ,Engineering ethics ,Relevance (information retrieval) ,Psychology ,media_common - Abstract
Presenting your paper at a meeting is an important part of sharing your research with the orthopaedic community. Presentations are generally short and sharp, and careful preparation is key to ensure that the premise, findings, and relevance of your work are successfully conveyed. For most conference papers, the structure will mirror that of a scientific manuscript, with an introduction, materials and methods, results, discussion, and conclusions. Anticipation of potential questions will help to clarify your research for the audience.
- Published
- 2019
- Full Text
- View/download PDF
15. How to Review a Clinical Research Paper?
- Author
-
Volker Musahl, Neel Patel, Marco Yeung, and Kanto Nagai
- Subjects
Clinical Practice ,Section (archaeology) ,Computer science ,media_common.quotation_subject ,Medical school ,Engineering ethics ,Review process ,Quality (business) ,media_common - Abstract
Critical evaluation of each section of a paper is needed in order to properly assess the purpose and quality of the paper and to understand the degree to which the results can influence clinical practice. Reviewing a paper is a skill that is best honed by practice, but there is no real formal training during medical school or residency on what to evaluate during a review and what the review process involves for a journal. Thus, this chapter will highlight the major points to review in each section of a paper and will provide a guide for young investigators to use while interpreting the findings of a paper. Additionally, the components of a review submission to a journal will be outlined.
- Published
- 2019
- Full Text
- View/download PDF
16. White Paper der Päpstlichen Akademie für das Leben
- Author
-
Thomas Sitte
- Abstract
Palliativversorgung steigt national und auf globaler Ebene stetig. Auch der Vatikan hat die Brisanz der bestehenden Versorgungslucke erkannt und setzte 2017 eine internationale, religions- und kirchenunabhangige Expertengroup zur Beratung ein, sie wird von einem der Autoren mitorganisiert. Die Gruppe veroffentlichte im Namen der Papstlichen Akademie fur das Leben in 2018 ein White Paper, das in den Kernaussagen, die sich an alle gesellschaftlichen Gruppen wenden, hier veroffentlicht wird. Moge es Ihnen, dem Leser, als Impuls dienen, zu den Veranderungen auch uber die eigentliche Patientenversorgung hinaus beizutragen.
- Published
- 2019
- Full Text
- View/download PDF
17. Policy-Paper: 'Ein zukunftsfähiger Gesellschaftsvertrag mit der Landwirtschaft: Plädoyer für eine neue Agrarpolitik'
- Author
-
Kai P. Purnhagen, Claudia Pahl-Wostl, Andrea Früh-Müller, Volkmar Wolters, Fabian Thomas, Christine Krämer, Peter H. Feindt, Caroline van Bers, and Alois Heißenhuber
- Abstract
Dieses Policy-Paper ist das wichtigste Ergebnis des ZA-NExUS-Projekts, das wissenschaftlich basierte Optionen fur die kunftige Ausgestaltung der Agrarpolitik aus der Perspektive des Natur- und Umweltschutzes formulieren sollte. Es wurde im Januar 2017 auf einer Pressekonferenz mit der damaligen Bundesministerin Dr. Barbara Hendricks der Offentlichkeit vorgestellt. Ausgehend vom Konzept eines zukunftsfahigen Gesellschaftsvertrags mit der Landwirtschaft wird eine neue Architektur der Agrarpolitik mit folgenden Kernelementen vorgeschlagen: Pramien fur Landschaftsvielfalt und fur Basismasnahmen im Agrarumwelt- und Klimaschutz, regionale Agrarumwelt- und Klimaschutzprogramme, ein Kooperationsprogramm Natur und Landwirtschaft sowie ein effektives Ordnungsrecht. Hinzu kommt ein Innovationsprogramm zur Entwicklung von Mehrwertmarkten fur umweltfreundliche Produkte durch Verbraucherkommunikation, praxisorientierte Forschung und Beratung.
- Published
- 2019
- Full Text
- View/download PDF
18. A Practical Guide to Writing (and Understanding) a Scientific Paper: Meta-Analyses
- Author
-
Corrado Bait, Riccardo Compagnoni, Alberto Grassi, Stefano Zaffagnini, Pietro Randelli, and Kristian Samuelsson
- Subjects
Data extraction ,Point (typography) ,Process (engineering) ,Computer science ,Statistical analyses ,Meta-analysis ,media_common.quotation_subject ,Quality (business) ,Data science ,Critical condition ,Systematic search ,media_common - Abstract
Meta-analyses represent an unbiased way of summarising the evidence on a specific topic. A meta-analysis is a formal process for gathering and evaluating literature to answer a specific question, using statistics to combine the data from randomised controlled trials. However, their use is controversial, as there are several critical conditions and methodological considerations that could produce misleading conclusions. A wide and extensive systematic search, clear-cut inclusion criteria and appropriate data extraction are mandatory when it comes to obtaining all the evidence relating to the investigated topic. Statistical analyses should be performed carefully and all sources of heterogeneity should be explored to avoid dangerous bias. The design and the quality of the included studies should be clearly presented to show the reader the overall quality of the evidence that is presented in the meta-analysis. Finally, the results should be interpreted critically from both a clinical and a statistical point of view.
- Published
- 2019
- Full Text
- View/download PDF
19. How to Write a Clinical Paper
- Author
-
Brendan Coleman
- Subjects
Writing style ,Structure (mathematical logic) ,Publishing ,business.industry ,Computer science ,Process (engineering) ,Engineering ethics ,business ,GeneralLiterature_MISCELLANEOUS - Abstract
Publishing the results of your research is a fulfilling experience, both from a personal viewpoint, but also helping advance the orthopaedic knowledge. This chapter discusses the process from completing the study to formulating the final manuscript that is ready for submission, providing a structure to follow in preparation of the manuscript and tips on improving your writing style.
- Published
- 2019
- Full Text
- View/download PDF
20. Article 7 TEU and the rule of law mechanism: A dissuasive weapon or a paper tiger?
- Author
-
Inger Österdahl
- Subjects
Vienna Convention on the Law of Treaties ,Political science ,Member state ,media_common.cataloged_instance ,Constitutional law ,European union ,Treaty on European Union ,Economic Justice ,Mechanism (sociology) ,Law and economics ,Rule of law ,media_common - Abstract
This contribution deals with the ability or not of the European Union (EU) to act in situations of serious systemic violations of the rule of law in a Member State. It does this by looking at the different available mechanisms including Article 7 in the Treaty on European Union (TEU) and the new Rule of Law Framework and excluding infringement procedures before the Court of Justice of the EU. The contribution also discusses whether as a result of a serious breach of the TEU a Member State could be expelled from the organisation. The TEU contains no provision on expulsion, but the Vienna Convention on the Law of Treaties potentially does. In conclusion, the contribution finds that neither mechanism can be likened to a weapon, nor are they probably dissuasive, but they might be persuasive thanks to a persistent and protracted dialogue. The EU has no realistic choice but to be a gentle civiliser of Member States.
- Published
- 2019
- Full Text
- View/download PDF
21. Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)
- Author
-
David J. Pym, Christos Ioannidis, and Tristan Caulfield
- Subjects
Discrete choice ,Computer science ,business.industry ,05 social sciences ,Short paper ,Usability ,Technological evolution ,02 engineering and technology ,Encryption ,Social relation ,Lead (geology) ,Work (electrical) ,Risk analysis (engineering) ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,050211 marketing ,020201 artificial intelligence & image processing ,business - Abstract
We introduce a model for examining the factors that lead to the adoption of new encryption technologies. Building on the work of Brock and Durlauf, the model describes how agents make choices, in the presence of social interaction, between competing technologies given their relative cost, functionality, and usability. We apply the model to examples about the adoption of encryption in communication (email and messaging) and storage technologies (self-encrypting drives) and also consider our model’s predictions for the evolution of technology adoption over time.
- Published
- 2017
- Full Text
- View/download PDF
22. Are Payment Card Contracts Unfair? (Short Paper)
- Author
-
Steven J. Murdoch, Ingolf Becker, Ross Anderson, M. Angela Sasse, N Bohm, Gianluca Stringhini, Alice Hutchings, and Ruba Abu-Salma
- Subjects
060201 languages & linguistics ,Card security code ,Computer science ,business.industry ,Short paper ,Internet privacy ,Usability ,06 humanities and the arts ,02 engineering and technology ,Directive ,Test (assessment) ,Payment card ,0602 languages and literature ,0202 electrical engineering, electronic engineering, information engineering ,Strong authentication ,020201 artificial intelligence & image processing ,Payment service provider ,business - Abstract
Fraud victims are often refused a refund by their bank on the grounds that they failed to comply with their bank’s terms and conditions about PIN safety. We, therefore, conducted a survey of how many PINs people have, and how they manage them. We found that while only a third of PINs are ever changed, almost half of bank customers write at least one PIN down. We also found bank conditions that are too vague to test, or even contradictory on whether PINs could be shared across cards. Yet, some hazardous practices are not forbidden by many banks: of the 22.9% who re-use PINs across devices, half also use their bank PINs on their mobile phones. We conclude that many bank contracts fail a simple test of reasonableness, and ‘strong authentication’, as required by the Payment Services Directive II, should include usability testing.
- Published
- 2017
- Full Text
- View/download PDF
23. Studies on Artistic Style of Chinese Ink Deckle-Edged Paper-Cutting Animation
- Author
-
Xiaoli Dong
- Subjects
Style (visual arts) ,Painting ,media_common.quotation_subject ,Chinese traditional ,Beauty ,Art ,Animation ,The arts ,GeneralLiterature_MISCELLANEOUS ,ComputingMethodologies_COMPUTERGRAPHICS ,Theme (narrative) ,media_common ,Visual arts - Abstract
This article elaborates processes of the production and development of ink deckle-edged paper-cutting animation and summarizes its artistic style. The overall style of ink deckle-edged paper-cutting animation has the unique beauty of artistic conception of Chinese traditional arts, modeling of character is featured on fine and delicate, and has characteristic of shading in Chinese ink painting. Its theme is refined and rich in philosophy. At the same time, this article also explores problems existed and future development of ink deckle-edged paper-cutting animation.
- Published
- 2018
- Full Text
- View/download PDF
24. A Bibliometric Analysis on the Published Papers in Journal of Technology Enhanced Foreign Language Education (TEFLE) from Year 2006 to 2015
- Author
-
Xiu-Yan Zhong
- Subjects
Classroom teaching ,Foreign language learning ,Evaluation system ,Bibliometric analysis ,business.industry ,Political science ,Foreign language ,Public relations ,China ,business ,Research method ,Qualitative research - Abstract
This Paper presents a bibliometric analysis of the papers published in the journal of Technology Enhanced Foreign Language Education (TEFLE), a core professional academic journal in China, during the years from 2006 to 2015. Our result aims to provide a clear view of the evolution of literature in the research field of technology enhanced foreign language learning over the past decade, intending to put forward a preliminary framework for TEFLE to improve its publication quality and at the same time foster better technology enhanced foreign language education in China. Bibliometric indicators of paper amount, author information, total citations, and frequency of keywords have been analyzed with the use of tools of BICOMB and SPSS and methods of co-word and cluster analysis, which indicates that, over the past decade, both of the quality of the published papers and the paper evaluation system has been improved. The statistics also reveal that the authors in TEFLE are mainly from eastern China, a research group that has been formed with more researchers constantly joining in, and a number of papers have been highly cited, bringing further interest in the related disciplines. Currently, the reform of foreign language classroom teaching with technological aids appears the hotspot topic in the related applied field. An effort is made to demonstrate that the research method has shifted to a new way that places equal emphasis on both quantitative and qualitative study in technology enhanced learning (TEL) and technologies have a bigger influence on foreign language learning in China, but in the meantime, there is an imbalance in the distribution of authors from different national geographic areas in TEL research.
- Published
- 2018
- Full Text
- View/download PDF
25. European Union Transport White Paper
- Author
-
Josias Zietsman, Greg Marsden, Henrik Gudmundsson, and Ralph P. Hall
- Subjects
business.industry ,Political union ,Technical standard ,Context (language use) ,International trade ,White paper ,Political science ,European integration ,Sustainability ,media_common.cataloged_instance ,European union ,business ,Free trade ,media_common - Abstract
This case study examines the European Transport White Paper of 2011 as an example of a planning domain application. The European Union is an economic and political union of some 28 states in Europe. Some of the key premises of the European Union have been to open up markets to free trade within the region and to seek to harmonise technical standards, laws, and processes to facilitate the free movement of people and goods. It is interesting that sustainability is also emphasized as an overarching goal for all areas of European policy making. The European Union employs a wide range of assessment and monitoring mechanisms to track progress on the implementation and performance of policies in the transport area, which is seen as a keystone for the so-called Single European Market. These mechanisms clearly reflect tensions between the different goals and pose challenges for the interpretation of indicators on transportation trends. Also the sheer size and complexity of the Union raises challenges for the effective application of indicator based evidence. The chapter will place the indicator- and application rich example of the ex ante assessment of the European Transport Policy White Paper in the wider context European Union policy making.
- Published
- 2016
- Full Text
- View/download PDF
26. Water Recovery in the Paper Industry, Membranes for
- Author
-
M. Concepcion Monte and Angeles Blanco
- Subjects
Membrane ,Chemistry ,Water recovery ,Pulp and paper industry - Published
- 2016
- Full Text
- View/download PDF
27. A Short Paper on the Incentives to Share Private Information for Population Estimates
- Author
-
Jens Grossklags, Patrick Loiseau, and Michela Chessa
- Subjects
Population estimate ,Incentive ,Analytics ,business.industry ,Computer science ,Internet privacy ,Short paper ,Data analysis ,business ,Computer security ,computer.software_genre ,Private information retrieval ,computer - Abstract
Consumers are often willing to contribute their personal data for analytics projects that may create new insights into societal problems. However, consumers also have justified privacy concerns about the release of their data.
- Published
- 2015
- Full Text
- View/download PDF
28. Water Recovery in Paper Industry by Membrane Operations
- Author
-
Mari Kallioinen
- Subjects
Membrane ,Environmental science ,Water recovery ,Pulp and paper industry - Published
- 2015
- Full Text
- View/download PDF
29. A Short Paper on Blind Signatures from Knowledge Assumptions
- Author
-
Lucjan Hanzlik and Kamil Kluczniak
- Subjects
Theoretical computer science ,Computer science ,String (computer science) ,0102 computer and information sciences ,02 engineering and technology ,Okamoto–Uchiyama cryptosystem ,Approx ,computer.software_genre ,01 natural sciences ,Signature (logic) ,Random oracle ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Blind signature ,020201 artificial intelligence & image processing ,Data mining ,Impossibility ,computer ,Standard model (cryptography) - Abstract
This paper concerns blind signature schemes. We focus on two moves constructions, which imply concurrent security. There are known efficient blind signature schemes based on the random oracle model and on the common reference string model. However, constructing two move blind signatures in the standard model is a challenging task, as shown by the impossibility results of Fischlin et al. The recent construction by Garg et al. (Eurocrypt’14) bypasses this result by using complexity leveraging, but it is impractical due to the signature size (\(\approx \) 100 kB). Fuchsbauer et al. (Crypto’15) presented a more practical construction, but with a security argument based on interactive assumptions. We present a blind signature scheme that is two-move, setup-free and comparable in terms of efficiency with the results of Fuchsbauer et al. Its security is based on a knowledge assumption.
- Published
- 2017
- Full Text
- View/download PDF
30. Private eCash in Practice (Short Paper)
- Author
-
Sébastien Gambs, Solenn Brunet, Nicolas Desmoulins, Jacques Traore, Saïd Gharout, and Amira Barki
- Subjects
Scheme (programming language) ,Subscriber identity module ,Computer science ,media_common.quotation_subject ,020302 automobile design & engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Payment ,Security token ,law.invention ,ecash ,0203 mechanical engineering ,law ,0202 electrical engineering, electronic engineering, information engineering ,Blind signature ,020201 artificial intelligence & image processing ,Use case ,computer ,computer.programming_language ,media_common ,Anonymity - Abstract
Most electronic payment systems for applications, such as eTicketing and eToll, involve a single entity acting as both merchant and bank. In this paper, we propose an efficient privacy-preserving post-payment eCash system suitable for this particular use case that we refer to, afterwards, as private eCash. To this end, we introduce a new partially blind signature scheme based on a recent Algebraic MAC scheme due to Chase et al. Unlike previous constructions, it allows multiple presentations of the same signature in an unlinkable way. Using it, our system is the first versatile private eCash system where users must only hold a sole reusable token (i.e. a reusable coin spendable to a unique merchant). It also enables identity and token revocations as well as flexible payments. Indeed, our payment tokens are updated in a partially blinded way to collect refunds without invading user’s privacy. By implementing it on a Global Platform compliant SIM card, we show its efficiency and suitability for real-world use cases, even for delay-sensitive applications and on constrained devices as a transaction can be performed in only 205 ms.
- Published
- 2017
- Full Text
- View/download PDF
31. An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature
- Author
-
Pramote Kuacharoen, Puchong Subpratatsavee, Kasetsart University (KU), National Institute of Development Administration |Bangkok] (NIDA), Khalid Saeed, Václav Snášel, and TC 8
- Subjects
Government ,Authentication ,Computer science ,business.industry ,[SHS.INFO]Humanities and Social Sciences/Library and information sciences ,Paper based ,Computer security ,computer.software_genre ,Barcode ,law.invention ,Software ,Digital signature ,paper-based document ,digital signature ,law ,Loan ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,authentication ,[INFO]Computer Science [cs] ,HC2D barcode ,Communication source ,business ,computer - Abstract
Part 8: Pattern Recognition and Image Processing; International audience; Paper-based documents are important and still widely used in government agencies and private entities as some documents cannot be replaced by electronic documents. These include loan agreements, dispatch or contracts, household registrations and passports. They must be paper-based. Paper-based documents can be easily forged with a printer and a scanner, and imaging software can easily edit them. This paper presents a paper-based document authentication by applying a digital signature and HC2D barcode to verify the integrity of the text message and the sender of the document. This is useful both for a quick inspection of documents with large quantities and monitoring that may help prevent fraud and forgery which may have occurred.
- Published
- 2014
- Full Text
- View/download PDF
32. What is the Best Way to Allocate Teacher’s Efforts: How Accurately Should We Write on the Board? When Marking Comments on Student Papers?
- Author
-
Olga Kosheleva and Karen Villaverde
- Subjects
Multimedia ,Computer science ,Handwriting ,computer.software_genre ,Legibility ,computer - Abstract
Writing on the board is an important part of a lecture. Lecturers’ handwriting is not always perfect. Usually, a lecturer can write slower and more legibly, this will increase understandability but slow down the lecture. In this chapter, we analyze an optimal trade-off between speed and legibility.
- Published
- 2017
- Full Text
- View/download PDF
33. DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)
- Author
-
Ahmad-Reza Sadeghi, Stephan Heuser, Marco Negro, and Praveen Kumar Pendyala
- Subjects
Logic bomb ,Computer science ,business.industry ,020206 networking & telecommunications ,Access control ,02 engineering and technology ,Static analysis ,Computer security ,computer.software_genre ,Application layer ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Dynamic program analysis ,Android (operating system) ,business ,computer ,Mobile device ,Privilege escalation - Abstract
Smart mobile devices process and store a vast amount of security- and privacy-sensitive data. To protect this data from malicious applications mobile operating systems, such as Android, adopt fine-grained access control architectures. However, related work has shown that these access control architectures are susceptible to application-layer privilege escalation attacks. Both automated static and dynamic program analysis promise to proactively detect such attacks. Though while state-of-the-art static analysis frameworks cannot adequately address native and highly obfuscated code, dynamic analysis is vulnerable to malicious applications using logic bombs to avoid early detection.
- Published
- 2017
- Full Text
- View/download PDF
34. KBID: Kerberos Bracelet Identification (Short Paper)
- Author
-
Michael Rushanan, Joseph Carrigan, and Paul D. Martin
- Subjects
Password ,Authentication ,Service (systems architecture) ,computer.internet_protocol ,Computer science ,010401 analytical chemistry ,Wearable computer ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,0104 chemical sciences ,Password strength ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Identification (information) ,Ticket ,0202 electrical engineering, electronic engineering, information engineering ,Kerberos ,computer - Abstract
The most common method for a user to gain access to a system, service, or resource is to provide a secret, often a password, that verifies her identity and thus authenticates her. Password-based authentication is considered strong only when the password meets certain length and complexity requirements, or when it is combined with other methods in multi-factor authentication. Unfortunately, many authentication systems do not enforce strong passwords due to a number of limitations; for example, the time taken to enter complex passwords. We present an authentication system that addresses these limitations by prompting a user for credentials once and then storing an authentication ticket in a wearable device that we call Kerberos Bracelet Identification (KBID).
- Published
- 2017
- Full Text
- View/download PDF
35. Papers and Cases
- Author
-
Klaus-Dieter Gronwald
- Subjects
Background information ,Reading (process) ,media_common.quotation_subject ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Organizational commitment ,Psychology ,Intercultural communication ,media_common - Abstract
This chapter includes complementary reading material as detailed background information to specific topics which can be used for an in-depth analysis by instructors and students. Reference to these articles is given at the end of each corresponding chapter.
- Published
- 2017
- Full Text
- View/download PDF
36. Paper-Based Inkjet Electrodes
- Author
-
Hugo Silva, João Martins, Ana Priscila Alves, Hugo Ferreira, André Lourenço, and Ana Fred
- Subjects
Silver chloride ,chemistry.chemical_compound ,Materials science ,chemistry ,business.industry ,Electrode ,Optoelectronics ,Paper based ,Substrate (printing) ,business ,Textile electrodes ,Inkjet printing - Abstract
Electrocardiographic (ECG) acquisition has evolved imensly over the last decade in particular with regards to sensing technology. From classical silver/silver chloride (Ag/AgCl) electrodes, to textile electrodes, and recently paper-based electrodes. In this paper we study a new type of silver/silver chloride (Ag/AgCl) electrodes based on a paper substrate that are produced using an inkjet printing technique. The cost reduction, easy-to-produce methodology, and easier recycling increase the potencial of application of these electrodes and opens this technology for everyday life use. We performed a comparison between this new type of electrode, with classical gelled Ag/AgCl electrodes and dry Ag/AgCl electrodes. We also compared the performance of each electrode when acquired using a professional-grade gold standard device, and a low cost platform. Experimental results showed that data acquired using our proposed inkjet printed electrode is highly correlated with data obtained through conventional electrodes. Moreover, the electrodes are robust to both high-end and low-end data acquisition devices.
- Published
- 2014
- Full Text
- View/download PDF
37. Item Differential in Computer Based and Paper Based Versions of a High Stakes Tertiary Entrance Test: Diagrams and the Problem of Annotation
- Author
-
Brad Jackel
- Subjects
Diagrammatic reasoning ,Annotation ,Multimedia ,business.industry ,Computer science ,Computer based ,Standardized test ,Paper based ,Artificial intelligence ,business ,computer.software_genre ,computer ,Natural language processing - Abstract
This paper presents the results from a tertiary entrance test that was delivered to two groups of candidates, one as a paper based test and the other as a computer based test. Item level differential reveals a pattern that appears related to item type: questions based on diagrammatic stimulus show a pattern of increased difficulty when delivered on computer. Differential in performance was not present in other sections of the test and it would appear unlikely to be explained by demographic differences between the groups. It is suggested this differential is due to the inability of the candidates to freely annotate on the stimulus when delivered on computer screen. More work needs to be done on considering the role of annotation as a problem solving strategy in high-stakes testing, in particular with certain kinds of stimulus, such as diagrams.
- Published
- 2014
- Full Text
- View/download PDF
38. Paper Wrapping, Based on Knowledge about Face Connectivity among Paper Fragments
- Author
-
Toyohide Watanabe and Kenta Matsushima
- Subjects
Paper sheet ,Tree (data structure) ,Creative work ,Human–computer interaction ,Interface (Java) ,business.industry ,Computer science ,Process (engineering) ,Face (geometry) ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Construct (python library) ,Artificial intelligence ,business - Abstract
The purpose of paper wrapping is to protect goods from external shocks, decorate goods beautifully, carry out materials/goods safely, etc. Also, the paper wrapping is intelligent and creative work. The knowledge about paper wrapping is dependent on the features of target-objects, paper sheets and wrapping purposes. This article addresses a method to design the wrapping process. We introduce the knowledge about paper wrapping and then construct a stage tree, which represents various kinds of wrapping means successfully. We propose a framework for designing the wrapping process appropriate to target-objects, and also describe an interactive support interface in the wrapping process.
- Published
- 2013
- Full Text
- View/download PDF
39. Integration of Optimization to the Design of Pulp and Paper Production Processes
- Author
-
Mika Strömman, Ilkka Seilonen, Kari Koskinen, and Jukka Peltola
- Subjects
Conceptual design ,Computer science ,Business process ,Design activities ,Pulp (paper) ,engineering ,Paper production ,Design process ,Interview study ,engineering.material ,Engineering design process ,Manufacturing engineering - Abstract
Adopting new methodology in a design process requires changes in organization, business process, roles, knowledge, data transfer and tools. The influence of the new methodology has to be evaluated and the costs of changes calculated before the change is possible. In pulp and paper industry the non-growing market situation has tightened the competition that much that cutting the design costs by integrating design activities is not going to be enough. The design itself has to be improved. In this paper, an optimization method is integrated to an existing design process of pulp and paper facilities. The model of a new design process is then assessed through a case study and an interview study to ensure that the design process can be realized in the conceptual design phase of a real delivery project.
- Published
- 2013
- Full Text
- View/download PDF
40. Quick Diagnosis of Alkaptonuria by Homogentisic Acid Determination in Urine Paper Spots
- Author
-
Annalisa Santucci, Lia Millucci, Vanna Micheli, Gabriella Jacomelli, and Giulia Bernardini
- Subjects
030203 arthritis & rheumatology ,Pathology ,medicine.medical_specialty ,business.industry ,010401 analytical chemistry ,Symptom development ,Diagnostic marker ,Urine ,medicine.disease ,01 natural sciences ,Article ,Alkaptonuria ,0104 chemical sciences ,Excretion ,03 medical and health sciences ,chemistry.chemical_compound ,Joint disease ,0302 clinical medicine ,chemistry ,Medicine ,Homogentisic acid ,business ,Homogentisate 1,2-dioxygenase - Abstract
Two methods are described for homogentisic acid (HGA) determination in dried urine spots (DUS) on paper from Alkaptonuria (AKU) patients, devised for quick early diagnosis. AKU is a rare autosomal recessive disorder caused by deficiency of homogentisate 1,2-dioxygenase, yielding in accumulation of HGA. Its massive excretion causes urine darkening by exposure to air or alkalinization, and is a diagnostic marker. The deposition of polymers produced after HGA oxidation within the connective tissues causes ochronotic arthritis, a degenerative joint disease manifesting in adulthood and only rarely in childhood. No early diagnosis is usually accomplished, awareness following symptom development.Two methods were designed for HGA determination in DUS: (1) a rapid semi-quantitative reliable method based on colour development in alkali and quantification by comparison with dried paper spots from HGA solutions of known concentration and (2) a quantitative and sensitive HPLC-linked method, previously devised for purine and pyrimidine analysis in urine and plasma.Colour intensity developed by DUS after alkali addition was proportional to HGA concentration, and calculated amounts were in good agreement with quantitative analysis performed by RP-HPLC on DUS and on urines as such.DUS, often used for different diagnostic purpose, are easily prepared and safely delivered. The simple and quick colour method proposed provides reliable HGA assessment and is fit for large screening. HGA concentration determined in 10 AKU patient DUS by both methods 1 and 2 was in agreement with direct urine assay and in the range reported by literature.A reliable HGA quantification based on colour development in paper urine spots is validated by HPLC-linked HGA quantification, and proposed as a quick diagnostic tool for AKU patients.
- Published
- 2016
- Full Text
- View/download PDF
41. Modelling to Contain Pandemic Influenza A (H1N1) with Stochastic Membrane Systems: A Work−in−Progress Paper
- Author
-
Lei Xu
- Subjects
Risk analysis (engineering) ,Stochastic modelling ,Computer science ,Event (computing) ,Pandemic influenza ,virus diseases ,Work in process ,Membrane computing - Abstract
Pandemic influenza A (H1N1) has spread rapidly across the globe. In the event of pandemic influenza A (H1N1), decision-makers are required to act in the face of substantial uncertainties. Simulation models can be used to project the effectiveness of mitigation strategies. Since nature is very complex, the perfect model that explains it will be complex too. Membrane system (P system) can be a perfect model modelling ecological system. This paper briefly describes stochastic membrane systems for modelling spread of pandemic influenza A (H1N1) in an isolated geographical region. The model is based on a discrete and stochastic modelling framework in the area of Membrane Computing. This model can be a useful tool for the prediction of infectious diseases within predefined areas, and the evaluation of intervention strategies.
- Published
- 2016
- Full Text
- View/download PDF
42. The First White Paper: Human Rights in China
- Author
-
Pinghua Sun
- Subjects
Government ,White (horse) ,White paper ,Human rights ,media_common.quotation_subject ,Political science ,Law ,China ,Ideal (ethics) ,media_common - Abstract
The first white paper—Human Rights in China was released by the Chinese government in 1991. This white paper regarded full implementation of human rights as a great ideal and loft goal that human beings have been pursuing. The release of this white paper broke the forbidden area of human rights research, and it exhibited great achievements of human rights protection in China by clarifying the attitudes and principles of the Chinese government to human rights. It maintained the international image of China and laid a foundation for human rights protection career in China. The white paper has become a milestone in the history of Chinese human rights development.
- Published
- 2013
- Full Text
- View/download PDF
43. Verification of the Minimum Illuminance for Comfortable Reading of an E-Paper
- Author
-
Shunta Sano, Nobuhiro Ishio, Tatsuya Koizuka, Masaru Miyao, and Takehito Kojima
- Subjects
Liquid-crystal display ,Computer science ,media_common.quotation_subject ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Illuminance ,Glare (vision) ,Backlight ,Readability ,law.invention ,law ,Power consumption ,Computer graphics (images) ,Reading (process) ,Electronic paper ,media_common - Abstract
Various e-paper devices also have been released (e.g. Amazon's Kindle DXTM), and their features include paper-like display and low power consumption. In our previous studies, in high light conditions, readability of the backlight LCD dropped significantly, because of the glare of the surrounding background. On the other hand, the readability of the electronic paper is increased, it was easy to read than backlit LCD. The e-paper that have low contrast ratio, evaluation of readability was low. In low light, the evaluation of the readability of the backlit LCD was high. The aim of this experiment was to verify the minimum illumination for comfortable reading with e-paper in low illumination (300 or less lx).
- Published
- 2013
- Full Text
- View/download PDF
44. Knowledge Sharing in Product Development – Delimitations of a White Paper Approach
- Author
-
Johan Holmqvist and Åsa Ericson
- Subjects
Engineering ,Focus (computing) ,White (horse) ,Knowledge management ,Empirical research ,White paper ,business.industry ,Manufacturing ,New product development ,business ,Knowledge transfer ,Knowledge sharing - Abstract
There is an on-going movement in manufacturing industry towards Product-Service Systems (PSS), which manifests the importance of making experience based knowledge organizationally available. In this paper a study of how white books is used and discussing any delimitations in transferring experiences is in focus. The paper builds on an empirical study in a manufacturing company, which has long ago implemented the white book approach and also has the vision of PSS development. It has been found that the format of a white book and the guidelines for authoring them could be a barrier for expressing individually gained experiences. Subsequently, does not support a knowledge transfer between projects having different aims, perspectives and knowledge domains.
- Published
- 2013
- Full Text
- View/download PDF
45. Evaluating Paper Prototype for Tabletop Collaborative Game Applications
- Author
-
Ricardo Nakamura, Mauricio Cirelli, Lucia Vilela Leite Filgueiras, and Marylia Gutierrez
- Subjects
Game design ,Multimedia ,InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,Computer science ,Human–computer interaction ,Interface (Java) ,Collaborative game ,User interface ,computer.software_genre ,computer ,Gesture ,Paper prototyping - Abstract
Identifying the natural gestures for a tabletop application is one of the most challenging tasks developers must accomplish in order to achieve a good system user interface. This problem is even more difficult in a collaborative environment. Cooperative Gestures allow richer interaction and must be evaluated when designing a new multi-user tabletop interface. In this paper we present the use of paper prototyping to analyze user interaction on a tabletop collaborative game application. Our results show that it is possible to extract natural gestures for an application using this technique, regardless of some limitations.
- Published
- 2013
- Full Text
- View/download PDF
46. An Exploratory Study on Content-Based Filtering of Call for Papers
- Author
-
Germán Hurtado Martín, Helga Naessens, Chris Cornelis, Steven Schockaert, Lupu, Mihai, Kanoulas, Evangelos, and Loizides, Fernando
- Subjects
Information retrieval ,Computer science ,Language models ,Exploratory research ,Contrast (statistics) ,Vector space model ,Filter (signal processing) ,Recommendation ,Science General ,Call for papers ,World Wide Web ,Language model ,Generative grammar ,Scope (computer science) - Abstract
Due to the increasing number of conferences, researchers need to spend more and more time browsing through the respective calls for papers (CFPs) to identify those conferences which might be of interest to them. In this paper we study several content-based techniques to filter CFPs retrieved from the web. To this end, we explore how to exploit the information available in a typical CFP: a short introductory text, topics in the scope of the conference, and the names of the people in the program committee. While the introductory text and the topics can be directly used to model the document (e.g. to derive a tf-idf weighted vector), the names of the members of the program committee can be used in several indirect ways. One strategy we pursue in particular is to take into account the papers that these people have recently written. Along similar lines, to find out the research interests of the users, and thus to decide which CFPs to select, we look at the abstracts of the papers that they have recently written. We compare and contrast a number of approaches based on the vector space model and on generative language models.
- Published
- 2013
- Full Text
- View/download PDF
47. Statistically Analyzing RGB Histograms to Remove Highlighting in Aged Paper Monochromatic Documents
- Author
-
Ricardo da Silva Barboza, Rafael Dueire Lins, Edson da F. de Lira, and Diego de A. Barros
- Subjects
Information retrieval ,White paper ,Computer science ,Histogram ,Personal choice ,Natural aging ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,RGB color model ,Monochromatic color ,Filter (signal processing) - Abstract
Text highlighting is often used to emphasize parts of a document for some reason. As highlighting is a personal choice of the reader, it can be seen as physically "damaging" the original document. A recent paper shows how to remove felt-pen highlighting in monochromatic documents with a white paper background. This paper generalizes that result to filter out highlighting in monochromatic documents with non-white background due to paper natural aging.
- Published
- 2013
- Full Text
- View/download PDF
48. Application of Rasch Model in Test Paper Quality Analysis—With the Case of Reading Literacy Pilot Test Paper for Grade 5–6 Students in Guangxi
- Author
-
Dehong Luo and Jing Gong
- Subjects
Wright ,Rasch model ,Reading (process) ,media_common.quotation_subject ,Mathematics education ,Pilot test ,General knowledge ,Dimension (data warehouse) ,Psychology ,Function (engineering) ,media_common ,Test (assessment) - Abstract
The methods of applying Rasch Model in the analysis of test paper quality are as follows: Wright Map which shows the reader a general knowledge of the whole survey, Multidimensionality Investigations which is used to examine whether test paper measures the latent trait (reading dimension of subjects), Item Fit Order, Bubble Diagram, and so on. Analysis result shows that the reading literacy pilot test paper for Grades 5–6 students in Guangxi meets the requirement generally. Specifically speaking, with covering different ability students and making up reasonably difficulty items, the test items reach the expected test effect. For better and higher application efficiency, the suggestion for usage is that the choice of Rasch Model function and result analysis methods be based on different test goals.
- Published
- 2015
- Full Text
- View/download PDF
49. Mycoremediation of Paper, Pulp and Cardboard Industrial Wastes and Pollutants
- Author
-
Shweta Kulshreshtha, Pradeep Bhatnagar, and Nupur Mathur
- Subjects
Pollutant ,Waste management ,business.industry ,Pulp (paper) ,cardboard ,Paper mill ,Mycoremediation ,engineering.material ,Pulp and paper industry ,Health problems ,visual_art ,visual_art.visual_art_medium ,engineering ,Environmental science ,business ,Water pollution ,Effluent - Abstract
Paper and pulp industries can broadly be divided into three categories—(1) handmade paper industries, (2) mill-made paper industries and (3) cardboard industries. All of these industries utilise water in different stages of making paper which is later discharged to nearby water bodies due to which these are considered as a major cause of water pollution. These effluents possess very high BOD, COD and toxic substances. As paper can be recycled a limited number of times, pulp fibres accumulate in the nearby area in the form of sludge which not only pollutes the soil or land but also produces enormous odour. Mycoremediation technology is a great boon which will be helpful in improving the existing situation and to minimise environmental and health problems associated with paper industrial wastes and pollutants. Therefore, in this chapter, we have discussed about the types of wastes and pollutants generated by handmade paper, mill-made paper and cardboard industries. Besides this, we have discussed about the fungi, their enzymes and role of both in mycoremediation of these wastes. In this chapter, we have also explained the suitable types of bioreactor, availability of culture, inoculation techniques and factors affecting the process. This information provides a platform for the workers who are working in field of mycoremediation of paper and pulp industrial wastes.
- Published
- 2012
- Full Text
- View/download PDF
50. Survey of Pen-and-Paper Computing
- Author
-
Jürgen Steimle
- Subjects
Engineering ,Paper document ,Work (electrical) ,business.industry ,Interface (computing) ,Perspective (graphical) ,Optical character recognition ,Paper computing ,computer.software_genre ,business ,Data science ,computer ,Field (computer science) - Abstract
Over several decades, a large body of research has been established that focuses on Pen-and-Paper Computing. This chapter reviews previous work of the field – both from a technological and interface perspective – and discusses future directions of research and development.
- Published
- 2012
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.