Legacy information systems are difficult to transform into the new or upgraded information systems. Part of the reason is being the incompatibility and the unscalability between t...
This study analyzed rhythm and timing in 18 instant messenger (IM) conversations between one advisor and four graduate students (4 dyads), hypothesizing that individuals would sho...
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
As the popularity of interactive social media grows, it is increasingly normal for individuals to reveal significant amounts of personal information online. Although this informat...
Nathan J. Claes, Carolyn Hurley, Michael A. Stefan...