The Web has plenty of reviews, comments and reports about products, services, government policies, institutions, etc. The opinions expressed in these reviews influence how people...
Eduard C. Dragut, Clement T. Yu, A. Prasad Sistla,...
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
Background: The proliferation of data repositories in bioinformatics has resulted in the development of numerous interfaces that allow scientists to browse, search and analyse the...
Kevin L. Garwood, Christopher Garwood, Cornelia He...
This demonstration will show the application of a unique approach to collecting and analyzing usability data from the users of Web sites and software applications. The NetRaker Su...