Software products are often released with missing functionality, errors, or incompatibilities that may result in failures, inferior performances, or user dissatisfaction. In previ...
Alessandro Orso, Taweesup Apiwattanapong, Mary Jea...
Researchers are using emerging technologies to develop novel play environments, while established computer and console game markets continue to grow rapidly. Even so, evaluating t...
Regan L. Mandryk, M. Stella Atkins, Kori M. Inkpen
We study properties of quantum strategies, which are complete specifications of a given party's actions in any multiple-round interaction involving the exchange of quantum in...
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Abstract. We introduce a special family of (assumption-based argumentation) frameworks for reasoning about the benets of decisions. These frameworks can be used for representing t...