Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
Human geospatial activities often involves the use of geographic information in mobile environment where the context of technology use is dynamic, complex, and unstable, creating ...
People with chronic health problems use online resources to understand and manage their condition, but many such resources can present competing and confusing viewpoints. We surve...
Jennifer Mankoff, Kateryna Kuksenok, Sara B. Kiesl...
Replacement policy, one of the key factors determining the effectiveness of a cache, becomes even more important with latest technological trends toward highly associative caches....
Hussein Al-Zoubi, Aleksandar Milenkovic, Milena Mi...
The organization and mining of malaria genomic and post-genomic data is important to significantly increase the knowledge of the biology of its causative agents, and is motivated,...
L.-M. Birkholtz, Olivier Bastien, G. Wells, D. Gra...