There are many ways to train student employees, but hands-on experience is invaluable. To provide our Resident Computer Consultants (RCCs) with the experience they need to solve t...
When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such ...
Because of practical limits in characterizing the safety profiles of therapeutic products prior to marketing, manufacturers and regulatory agencies perform post-marketing surveill...
David M. Fram, June S. Almenoff, William DuMouchel
Navigational surrogates are representations that stand for information resources within search engine result sets, e-commerce sites, and digital libraries. They also form the basi...
Andruid Kerne, Steven M. Smith, Hyun Choi, Ross Gr...
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...