Search
Search Results
-
Eye to Eye: Gaze Patterns Predict Remote Collaborative Problem Solving Behaviors in Triads
We investigated the feasibility of using eye gaze to model collaborative problem solving (CPS) behaviors in 96 triads (N = 288) who used... -
Quantifying polarization in online political discourse
In an era of increasing political polarization, its analysis becomes crucial for the understanding of democratic dynamics. This paper presents a...
-
Edgelet computing: enabling privacy-preserving decentralized data processing at the network edge
The convergence of opportunistic networks and trusted execution environments at the network edge presents a compelling opportunity for fully...
-
-
Abuse-freeness in contract signing: a blockchain-based proposal
Electronic contract signing requires the design of protocols that guarantee that the exchange is fair. In the past 5 years, we have observed that...
-
Multiparty Federation
Federated identity protocols like SAML and OpenID Connect enable us to authenticate people in other domains, but trust issues quickly surface. For... -
Microsoft Teams Troubleshooting Approaches
Balu N Ilaga* Vijay Ireddy -
Data Democratization, Governance, and Security
Modern data democratization, governance, and security in the modern data warehouse environment is not conceptual anymore—it is essential. Data needs... -
Case Study of Commercial Systems
In this chapter, we review a variety of commercial systems for CIR and related tasks. Due to the proprietary nature of many of these systems, we... -
The Threat of Surveillance and the Need for Privacy Protections
In recent years, and since the introduction of the General Data Protection Regulation (GDPR) in particular, we have seen an increased interest (and... -
Joint Video Transcoding and Representation Selection for Edge-Assisted Multi-party Video Conferencing
Current cloud-based multi-party video conferencing suffers from heavy workloads on media servers caused by video transcoding. Emerging edge computing... -
The Social Responsibilities of Scientists and Technologists in the Digital Age
What responsibilities do digital scientists and professionals have in serving society and the public, beyond doing “purely” “fundamental” scientific,... -
Challenges and Opportunities of Computational Social Science for Official Statistics
The vast amount of data produced everyday (so-called digital traces) and available nowadays represent a gold mine for the social sciences, especially... -
Vulnerability management as compliance requirement in product security regulation—a game changer for producers’ liability and consequential improvement of the level of security in the Internet of Things?
The article outlines the European Union (EU) regulation of information technology (IT) security in Internet of Things products from a consumer and...
-
Microsoft Teams Troubleshooting Approaches
In this chapter, you will learn different functionalities of the Teams app, including call quality and meeting troubleshooting. Also, you will learn... -
Zero Trust Security Architecture for Digital Privacy in Healthcare
Ensuring the security and privacy of confidential medical data has become increasingly crucial with the widespread digitization of healthcare... -
Methods for Implementing Usable Secure Online Public Services
This chapter presents methods for the implementation and evaluation of usable secure online public services. -
A Lattice-Based Single-Share Secret Sharing Scheme
In general, in a secret sharing scheme, the dealer chooses shares and distributes them to the participants securely. For the secure communication,...
-
Efficient and Universally Composable Single Secret Leader Election from Pairings
Single Secret Leader Election (SSLE) protocols allow a set of users to elect a leader among them so that the identity of the winner remains secret... -
Calling and media bots
As a final chapter on bots, I could not miss the opportunity to discuss calling and media bots in Teams with you. In my opinion, they are the ones...