Do different design and information content factors influence trust and mistrust of online health sites? Fifteen women faced with a risky health decision were observed while searc...
Elizabeth Sillence, Pamela Briggs, Lesley Fishwick...
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Recognizing commonly used data structures and algorithms is a key activity in reverse engineering. Systems developed to automate this recognition process have been isolated, stand...