Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
With the move to distributed, component based systems involving reuse of components and services, emergent, system-wide properties, including safety and security in particular, are...
Abstract. This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toepli...
The software engineering community has documented countless success stories where lean and agile software development practices have rescued failing projects and helped countless ...
The lack of a common language and mutual understanding between the disciplines of systems development/software engineering and HCI does create challenges for both teaching and pra...