Abstract. Theorem provers, model checkers, static analyzers, test generators. . . all of these and many other kinds of formal methods tools can contribute to the analysis and devel...
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
The volume of stream data delivered from different information sources is increasing. There are a variety of demands to utilize such stream data for applications. Stream processin...
We empirically compare five different publicly-available phrase sets in two large-scale (N = 225 and N = 150) crowdsourced text entry experiments. We also investigate the impact ...
– Object-Oriented Analysis (OOA) has been proposed and applied in software engineering for more than fifteen years. Many researchers and practitioners have published many article...