Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
Harmonizing decentralized development of ICT solutions with centralized strategies, e.g., meant to favor reuse and optimization of resources, is a complex technical and organizatio...
Pavel Shvaiko, Adolfo Villafiorita, Alessandro Zor...
Methodology, theory, and practice in the ®eld of Human±Computer Interaction (HCI) all share the goal of producing interactive software that can be used eciently, eectively, ...
We present a computational model that successfully captures the cell behaviors that play important roles in 2-D cell aggregation. A virtual cell in our model is designed as an ind...
Manolya Eyiyurekli, Prakash Manley, Peter I. Lelke...
This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, e...