As every user has his own idiosyncrasies and preferences, an interface that is honed for one user may be problematic for another. To accommodate a diverse range of users, many com...
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Software developers writing new software have strong incentives to make their products compliant to standards such as corba, com, and JavaBeans. Standardscompliance facilitates in...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
While tactical command. control and communication environments might appear to be entirely instrumental in nature, they nevertheless provide a setting for social interaction. This...
Grid access methods are still dominated by command line tools or manually developed, problem specific graphical user interfaces. This fact reduces the acceptance of the Grid for ...