The information that is made available through the semantic web will be accessed through complex programs (web-services, sensors, etc.) that may interact in sophisticated ways. Com...
Ronny Siebes, David Dupplaw, Spyros Kotoulas, Adri...
Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
Previous research has revealed gender differences that impact females’ willingness to adopt software features in end users’ programming environments. Since these features have...
Laura Beckwith, Shraddha Sorte, Margaret M. Burnet...
Mobile devices, applications and services have become integrated into people’s daily lives on a personal and professional level. Although traditional research methods are being ...
Penny Hagen, Toni Robertson, Melanie Kan, Kirsten ...
Abstract. The physical disappearance of the computer, associated with Ubicomp, has led to a number of interaction challenges. Due to the lack of an interface users are losing contr...