In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Marco Cova, Davide Balzarotti, Viktoria Felmetsger...
We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
This paper describes a discussion-bot that provides answers to students’ discussion board questions in an unobtrusive and humanlike way. Using information retrieval and natural ...
Donghui Feng, Erin Shaw, Jihie Kim, Eduard H. Hovy
Networked appliances can simplify our lives, but interacting with them can be difficult in itself. KitchenSense is an early prototype of a networked kitchen full of sensors that u...
The design, development, and use of complex systems models raises a unique class of challenges and potential pitfalls, many of which are commonly recurring problems. Over time, res...