Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
One often meets the argument that the adoption of mobile Internet services is difficult to understand due to a lack of relevant research. However, much research has already been c...
Diagnosing multiple faults for a complex system is often very difficult. It requires not only a model which adequately represents the diagnostic aspect of a complex system, but al...
Abstract--This paper compares two evaluation criterion frameworks for sociotechnical software. Research on the technology acceptance model (TAM) confirms that perceived usefulness ...
With an explosion in the proliferation of user-generated content in communities, information overload is increasing and quality of readily available online content is deterioratin...