In this paper, we present the security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors. We will not try to determine whether the b...
- This paper proposes the use of an interactive web based problem solving application that utilises flowchart based programming and code generation to address the issues faced by n...
This paper deals with the derivational morphology of automatic word form recognition. It presents a set of declarative rules which augment lexical entries with information governi...
We developed and evaluated a visualization tool for browsing individual blog archives. In our study, we solicited qualitative feedback from the participants to explore the reasons...
Spreadsheets are heavily employed in administration, financial forecasting, education, and science because of their intuitive, flexible, and direct approach to computation. They r...