Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
The efficient use of network capacity strongly depends upon the path selection procedure. In this paper we propose and evaluate efficient path selection algorithms for survivable ...
Chadi Assi, Ahmad Khalil, Nasir Ghani, Mohamed A. ...
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
With the recent advances in communications technologies and decentralization of work practices, there has been an increase in distributed, remote, computerized work environments. I...
Software development teams face challenges communicating with each other. This paper presents the design of a social real-time collaborative IDE called SCI that unifies the concep...
Hani Bani-Salameh, Clinton Jeffery, Jafar Al-Ghara...