Concept location is one of the fundamental activities during software maintenance which locates the parts of the source code where a specific concept is implemented. The methods f...
The performance of a system, especially a multiprocessor system, heavily depends upon the efficiency of its bus architecture. This paper presents a methodology to generate a custo...
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
We introduce TwinSpace, a flexible software infrastructure for combining interactive workspaces and collaborative virtual worlds. Its design is grounded in the need to support dee...
Derek F. Reilly, Hafez Rouzati, Andy Wu, Jee Yeon ...
– Existing team training software often requires that trainees be organized as physical teams and the members of the same team be trained at the same time. To demonstrate that te...
Dianxiang Xu, Michael S. Miller, Richard A. Volz, ...