Human-computer interaction research often includes a significant design component. In cases where software or other tools are developed and described, but no empirical evaluation ...
Blaine Hoffman, Helena M. Mentis, Matthew R. Peter...
—The term Enterprise 2.0 applies to the use of Web 2.0 technologies as a support for business activities within the organizations. These technologies are exploited to foster inte...
Nicola Capuano, Matteo Gaeta, Francesco Orciuoli, ...
Maintainability is a key quality attribute of successful software systems. However, its management in practice is still problematic. Currently, there is no comprehensive basis for...
Florian Deissenboeck, Stefan Wagner, Markus Pizka,...
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...