Using effective teaching practices is a high priority for educators. One important pedagogical skill for computer science instructors is asking effective questions. This paper pre...
Kristy Elizabeth Boyer, William Lahti, Robert Phil...
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
The rapid growth of the Internet has made computer-mediated communication popular and the use of e-negotiation systems (ENS) has attracted great attention from researchers and pra...
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...