Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2023
To Re-experience the Web: A Framework for the Transformation and Replay of Archived Web Pages
ACM Transactions on the Web (TWEB), Volume 17, Issue 4Article No.: 28, Pages 1–49https://doi.org/10.1145/3589206When replaying an archived web page, or memento, the fundamental expectation is that the page should be viewable and function exactly as it did at the archival time. However, this expectation requires web archives upon replay to modify the page and its ...
- research-articleFebruary 2023
Continual Recognition with Adaptive Memory Update
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 19, Issue 3sArticle No.: 134, Pages 1–15https://doi.org/10.1145/3573202Class incremental continual learning aims to improve the ability of modern classification models to continually recognize new classes without forgetting the previous ones. Prior art in the field has largely considered using a replay buffer. In this ...
- research-articleOctober 2021
"I need to play three times before I kind of understand": A Preliminary Exploration of Players' Reasons for (and against) Replaying a Visual Novel
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 5, Issue CHI PLAYArticle No.: 257, Pages 1–17https://doi.org/10.1145/3474684Replay of interactive stories is an essential characteristic of the medium, enabling players to both see whether their choices impact the narrative, and work towards an understanding of the story and underlying system. Despite the centrality of replay to ...
- short-paperAugust 2021
Metadata-driven eye tracking for real-time applications
DocEng '21: Proceedings of the 21st ACM Symposium on Document EngineeringArticle No.: 22, Pages 1–4https://doi.org/10.1145/3469096.3474935When conducting eye tracking studies, having a mechanism to collect data, build workflows, and validate results in a FAIR (i.e., findable, accessible, interoperable, and reusable) manner, facilitates automation. Given the vast landscape of vendor-...
-
- research-articleJune 2021
Developer and user-transparent compiler optimization for interactive applications
PLDI 2021: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and ImplementationPages 268–281https://doi.org/10.1145/3453483.3454043Traditional offline optimization frameworks rely on representative hardware, software, and inputs to compare different optimization decisions on. With application-specific optimization for mobile systems though, the idea of a representative test bench ...
- rfcJanuary 2021
RFC 8967: MAC Authentication for the Babel Routing Protocol
This document describes a cryptographic authentication mechanism for the Babel routing protocol that has provisions for replay avoidance. This document obsoletes RFC 7298.
- demonstrationOctober 2020
TimeTracer: a tool for back in time traceability replaying
ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Companion ProceedingsPages 33–36https://doi.org/10.1145/3377812.3382141Ensuring correct trace links between different types of artifacts (requirements, architecture, or code) is crucial for compliance in safety-critical domains, for consistency checking, or change impact assessment. The point in time when trace links are ...
- research-articleApril 2020
Again, Together: Socially Reliving Virtual Reality Experiences When Separated
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing SystemsPages 1–12https://doi.org/10.1145/3313831.3376642To share a virtual reality (VR) experience remotely together, users usually record videos from an individual's point of view and then co-watch these videos. However, co-watching recorded videos limits users to reliving their memories from the perspective ...
- research-articleOctober 2019
A Short History of Table-Talk and Live-Action Role-Playing in Japan: Replays and the Horror Genre as Drivers of Popularity
Simulation and Gaming (SIMG), Volume 50, Issue 5Pages 621–644https://doi.org/10.1177/1046878119879738Background. The history of larp, live-action role-play, in Japan may be rather short but documents exponential growth in the entertainment sector as well as in educational gaming. Following trends of related forms of analog role-playing games, the horror ...
- research-articleJune 2019
Data Repair for Distributed, Event-based IoT Applications
DEBS '19: Proceedings of the 13th ACM International Conference on Distributed and Event-based SystemsPages 139–150https://doi.org/10.1145/3328905.3329511Motivated by the growth of Internet of Things (IoT) technologies and the volumes and velocity of data that they can and will produce, we investigate automated data repair for event-driven, IoT applications. IoT devices are heterogeneous in their ...
- posterApril 2019
SoftLoRa - a LoRa-based platform for accurate and secure timing: poster abstract
IPSN '19: Proceedings of the 18th International Conference on Information Processing in Sensor NetworksPages 309–310https://doi.org/10.1145/3302506.3312603LoRa is an emerging low-power wide-area network technology. Existing studies have focused on LoRa's communication performance. Differently, we study two physical properties of LoRa, i.e., its performance in timing the signal propagation and the ...
- short-paperDecember 2018
System for preventing loss of replay desire in games by guiding the user to voluntary leaving from and returning to the game sessions
VRCAI '18: Proceedings of the 16th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and its Applications in IndustryArticle No.: 14, Pages 1–4https://doi.org/10.1145/3284398.3284418We have conducted a research on the time-loss experience during game play. From the study, we propose system design for preventing loss of replay desire in games by guiding voluntary leave. Experiments have shown the effectiveness of the proposed ...
- rfcOctober 2018
RFC 8473: Token Binding over HTTP
This document describes a collection of mechanisms that allow HTTP servers to cryptographically bind security tokens (such as cookies and OAuth tokens) to TLS connections.
We describe both first-party and federated scenarios. In a first- party scenario, ...
- rfcOctober 2018
RFC 8472: Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation
This document specifies a Transport Layer Security (TLS) extension for the negotiation of Token Binding protocol version and key parameters. Negotiation of Token Binding in TLS 1.3 and later versions is beyond the scope of this document.
- rfcOctober 2018
RFC 8471: The Token Binding Protocol Version 1.0
This document specifies version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS bindings spanning multiple TLS sessions and connections. Applications are ...
- research-articleSeptember 2018
Efficient and deterministic record & replay for actor languages
ManLang '18: Proceedings of the 15th International Conference on Managed Languages & RuntimesArticle No.: 15, Pages 1–14https://doi.org/10.1145/3237009.3237015With the ubiquity of parallel commodity hardware, developers turn to high-level concurrency models such as the actor model to lower the complexity of concurrent software. However, debugging concurrent software is hard, especially for concurrency models ...
- rfcSeptember 2018
RFC 8470: Using Early Data in HTTP
Using TLS early data creates an exposure to the possibility of a replay attack. This document defines mechanisms that allow clients to communicate with servers about HTTP requests that are sent in early data. Techniques are described that use these ...
- extended-abstractOctober 2017
'Global view' in SDN: existing implementation, vulnerabilities & threats
SIN '17: Proceedings of the 10th International Conference on Security of Information and NetworksPages 303–306https://doi.org/10.1145/3136825.3136862Software Defined Network (SDN) provides a programmable and flexible network with separation in data and control plane. SDN has the capability to maintain a `Global View' at the cotroller which is the core of all SDN promises. A global view refers to the ...
- articleOctober 2016
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
Security and Communication Networks (SACN), Volume 9, Issue 15Pages 3030–3044https://doi.org/10.1002/sec.1499This paper analyses the threat of replay spoofing or presentation attacks in the context of automatic speaker verification. As relatively high-technology attacks, speech synthesis and voice conversion, which have thus far received far greater attention ...