Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decisi...
Marco Barreno, Peter L. Bartlett, Fuching Jack Chi...
The last decade has seen an explosion in blogging and the blogosphere is continuing to grow, having a large global reach and many vibrant communities. Researchers have been pouring...
We outline a methodological classification for evaluation approaches of software in general. This classification was initiated partly owing to involvement in a biennial European c...
Muriel Amar, Sophie David, Rachel Panckhurst, Lisa...
This study explores intranets as information infrastructure and this conceptualization is supported by evidence from three interpretive case studies. If an intranet is considered ...
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...