While health records are increasingly stored electronically, we, as citizens, have little access to this data about ourselves. We are not used to thinking of these official record...
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
Abstract. Understanding program behavior is at the foundation of program optimization. Techniques for automatic recognition of program constructs characterize the behavior of code ...
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Relying on naturalistic observation, via video selfdocumentaries, contextual interviews, and focus groups, we explored gender differences in the information and communication tech...
Weimin Hou, Manpreet Kaur, Anita Komlodi, Wayne G....