Recognizing Hospital Care Activities with a Pocket Worn Smartphone

Abstract: In this work, we show how a smart-phone worn unobtrusively in a nurses coat pocket can be used to document the patient care activities performed during a regular morning routine. The main contribution is to show how, taking into Continue reading

Secure and Privacy-Friendly Public Key Generation and Certification

Abstract: Digital societies increasingly rely on secure communication between parties. Certificate enrollment protocols are used by certificate authorities to issue public key certificates to clients. Key agreement protocols, such as Diffie-Hellman, are used to compute secret keys, using public keys Continue reading

iKUP Keeps Users’ Privacy in the Smart Grid

Abstract: Privacy-enhancing technologies for the Smart Grid usually address either the consolidation of users’ energy consumption or the verification of billing information. The goal of this paper is to introduce iKUP, a protocol that addresses both problems simultaneously. iKUP is Continue reading

A new paradigm for the study of corruption across cultures

Abstract: Corruption frequently occurs in many aspects of multi-party interaction between private agencies and government employees. Past works studying corruption in a lab context have explicitly included covert or illegal activities in participants’ strategy space or have relied on surveys Continue reading

A Collaboration Model for Community-Based Software Development with Social Machines

Abstract: Crowdsourcing is generally used for tasks with minimal coordination, providing limited support for dynamic reconfiguration. Modern systems, exemplified by social machines, are subject to continual flux in both the client and development communities and their needs. To support crowd Continue reading