Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Group recommender systems introduce a whole set of new challenges for recommender systems research. The notion of generating a set of recommendations that will satisfy a group of ...
As demand for grid and cloud computing solutions increases, the need for user oriented software to provide access to theses resources also increases. Until recently the use of com...
Casey Rathbone, Lizhe Wang, Gregor von Laszewski, ...
The defining characteristic of the Internet today is an abundance of information and choice. Recommender Systems (RS), designed to alleviate this problem, have so far not been ver...
Philip Bonhard, Martina Angela Sasse, Clare Harrie...
The research design, evaluation methodology, and statistical analysis of the clinical efficacy of healthcare information technology (HIT) implementation can be a challenging task....
Lance Roberts, Marcia M. Ward, Jane M. Brokel, Dou...