We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Engaging in a secondary task, such as dialing a cell phone, while driving a car has been found to have a deleterious effect on driver performance. A point often overlooked though ...
The use of computer applications to support learning and assessment is becoming more common, along with a growing body of research focusing on the pedagogical effectiveness of the...
Originally XML was used as a standard protocol for data exchange in computing. The evolution of information technology has opened up new situations in which XML can be used to aut...
We explain the raison d’ˆetre and basic ideas of input/output logic, sketching the central elements with pointers to other publications for detailed developments. The motivation...