Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
This paper describes the Markup Analysis Project, a research initiative of the Information Policy and Practice Research Group at the University of Sydney to investigate frameworks ...
Recent developments of document technologies have strongly impacted the evolution of Web clients over the last fifteen years, but all Web clients have not taken the same advantag...
Recent advances in ubiquitous technology have greatly changed the way people stay connected. We conducted an in-depth video shadowing study to observe how close-knit groups use al...
Ellen Isaacs, Margaret H. Szymanski, Yutaka Yamauc...
Abstract Declarative queries are proving to be an attractive paradigm for interacting with networks of wireless sensors. The metaphor that "the sensornet is a database" i...
Amol Deshpande, Carlos Guestrin, Samuel Madden, Jo...