This paper proposes to use eye movements to characterize the performance of individuals in reviewing source code of computer programs. We first present an integrated environment t...
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
In this work we look back into the proof of the PCP Theorem, with the goal of finding new proofs that are "more combinatorial" and arguably simpler. For that we introduc...
We report on summer student programmes and activities we have run, or contributed towards, for undergraduate students at Universities in the UK; in the USA; in Australia and in Ne...
Kenneth A. Hawick, Heath A. James, Christie James,...
This study models the supply chain related cash flow risks for a business entity measured by the standard deviations of cash inflows, outflows, and netflows of each period in a pl...