Recognizing Hospital Care Activities with a Pocket Worn Smartphone

Abstract: In this work, we show how a smart-phone worn unobtrusively in a nurses coat pocket can be used to document the patient care activities performed during a regular morning routine. The main contribution is to show how, taking into Continue reading

Adapting interaction environments to diverse users through online action set selection

Abstract: Interactive interfaces are a common feature of many systems ranging from field robotics to video games. In most applications, these interfaces must be used by a heterogeneous set of users, with substantial variety in effectiveness with the same interface Continue reading

Secure and Privacy-Friendly Public Key Generation and Certification

Abstract: Digital societies increasingly rely on secure communication between parties. Certificate enrollment protocols are used by certificate authorities to issue public key certificates to clients. Key agreement protocols, such as Diffie-Hellman, are used to compute secret keys, using public keys Continue reading

iKUP Keeps Users’ Privacy in the Smart Grid

Abstract: Privacy-enhancing technologies for the Smart Grid usually address either the consolidation of users’ energy consumption or the verification of billing information. The goal of this paper is to introduce iKUP, a protocol that addresses both problems simultaneously. iKUP is Continue reading

A new paradigm for the study of corruption across cultures

Abstract: Corruption frequently occurs in many aspects of multi-party interaction between private agencies and government employees. Past works studying corruption in a lab context have explicitly included covert or illegal activities in participants’ strategy space or have relied on surveys Continue reading