Creating, maintaining, or using a digital library requires the manipulation of digital documents. Information workspaces provide a visual representation allowing users to collect,...
Frank M. Shipman III, Hao-wei Hsieh, J. Michael Mo...
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
This demonstration will show the application of a unique approach to collecting and analyzing usability data from the users of Web sites and software applications. The NetRaker Su...
Applications increasingly make use of the distributed platform that the World Wide Web provides ? be it as a Software-as-a-Service such as salesforce.com, an application infrastru...
Heiko Ludwig, Jim Laredo, Kamal Bhattacharya, Lili...
In a catalogue for computer-based models the basic problem is that complex interdependencies between models must be addressed, which are dependent on an application's domain....