Learn More
The performance measurement revolution started in the late 1970s with the dissatisfaction of traditional backward looking accounting systems. Since then the literature in this field is emerging. Most of the focus was on designing performance measurement system (PMS), with few studies illustrating the issues in implementing and using PMS. Although Management(More)
Mobile phones are becoming increasingly sophisticated with a rich set of on-board sensors and ubiquitous wireless connectivity. However, the ability to fully exploit the sensing capabilities on mobile phones is stymied by limitations in multimedia processing techniques. For example, search using cellphone images often encounters high error rate due to low(More)
Pinterest is a popular social curation site where people collect, organize, and share pictures of items. We studied a fundamental issue for such sites: what patterns of activity attract attention (audience and content reposting)-- We organized our studies around two key factors: the extent to which users specialize in particular topics, and homophily among(More)
—Traffic engineering (TE) has been long studied as a network optimization problem, but its impact on user-perceived application performance has received little attention. Our paper takes a first step to address this disparity. Using real traffic matrices and topologies from three ISPs, we conduct very large-scale experiments simulating ISP traffic as an(More)
Studies have shown that the recommendation of unseen, novel or serendipitous items is crucial for a satisfying and engaging user experience. As a result, recent developments in recommendation research have increasingly focused towards introducing novelty in user recommendation lists. While, existing solutions aim to find the right balance between the(More)
Health care delivery processes consist of complex activity sequences spanning organizational, spatial, and temporal boundaries. Care is human-directed so these processes can have wide variations in cost, quality, and outcome making systemic care process analysis, conformance testing, and improvement challenging. We designed and developed an interactive(More)
Used by the user to generate the public-private key pair (pk, sk) pk is published and the sk kept secret Run on a security parameter κ Used by the user to generate signature on some message m The secret key sk used for signing σ $ ← − S (sk, m) Outputs 1 if σ is a valid signature on m; else, outputs 0 b ← V Used by the PKG to generate the public parameters(More)
Implantable RFID chips are being seen as a potential security device in near future with the application oriented availability of these chips in marketplace. The applications are seen in a wide domain from health monitoring to emergency solutions, but there is a darker side with erosion of privacy and breach in the bodily integrity with implantation of such(More)