This article presents a study of online digital library (DL) uses, based on three data sources (online questionnaire, Internet traffic data and interviews). We show that DL users d...
Houssem Assadi, Thomas Beauvisage, Catherine Lupov...
— We consider a scenario where an application service provider (ASP) hires a network service provider (NSP) to deliver its service and pays for the employment of the NSP. We stud...
In this paper we discuss the role of open-source hardware in supporting creativity. We use the case study of an opensource FM radio and explore the modes of creation that emerged ...
Address space randomization is an emerging and promising method for stopping a broad range of memory corruption attacks. By randomly shifting critical memory regions at process in...
Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, ...
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...