Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
Byte-code based languages are slowly becoming adopted in embedded domains because of improved security and portability. Another potential reason for their adoption is the reputati...
This paper focuses on question selection methods for conversational recommender systems. We consider a scenario, where given an initial user query, the recommender system may ask ...
In multi-disciplinary development, where various domain specific tools are used by developers to specify and analyse a system, efficient system development requires that the model...
As technology sizes decrease and die area increases, designers are creating increasingly complex computing systems using FPGAs. To reduce design time for new products, the reuse o...