In previous papers, I have argued that while parallel mechanisms are well known for their favorable structural properties, their utility is generally limited by an inherently small...
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
System administrators are unique computer users. As power users in complex and high-risk work environments, intuition tells us that they may have requirements of the tools they us...
Nicole F. Velasquez, Suzanne P. Weisband, Alexandr...
Many studies have shown how knowledge workers face challenges while multi-tasking among several projects and initiatives at the workplace. Researchers and consultants of personal p...
Refactoring in object-orientation has gained increased attention due to its ability to improve design quality. Refactoring using design patterns (DPs) leads to production of high ...