We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Bug tracking systems are valuable assets for managing maintenance activities. They are widely used in open-source projects as well as in the software industry. They collect many d...
Giuliano Antoniol, Kamel Ayari, Massimiliano Di Pe...
To enhance the widespread use of a parallel supply chain simulator, a web front-end that enables access at any time and from any location has been developed. The front-end provide...
Boon-Ping Gan, Li Liu, Zhengrong Ji, Stephen John ...
We have developed and integrated software agents with two educational groupware systems (TeamWave Workplace and FLE), using evolutionary prototyping and empiricalbased design as d...
Continuum robots, which are composed of multiple concentric, precurved elastic tubes, can provide dexterity at diameters equivalent to standard surgical needles. Recent mechanicsba...
D. Caleb Rucker, Bryan A. Jones, Robert J. Webster...