Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
The design of software is often depicted by graphs that show components and their relationships. For example, a structure chart shows the calling relationships among components. O...
We present a program visualization tool called Jeliot 3 that is designed to aid novice students to learn procedural and object oriented programming. The key feature of Jeliot is t...
Recent convergence between low-cost technology, artform and political discourse presents a new design space for enabling public participation and expression. We explore non-expert...
More and more web users keep up with newest information through information streams such as the popular microblogging website Twitter. In this paper we studied content recommendat...
Jilin Chen, Rowan Nairn, Les Nelson, Michael Berns...