Cluster tools are representatives of a special kind of tool where process times of jobs depend on the combination in which they are processed together on the tool and hence, depen...
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
— Narrative reports and criminal records are stored digitally across individual police departments, enabling the collection of this data to compile a nation-wide database of crim...
Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters...
Abstract—Computer systems are increasingly driven by workloads that reflect large-scale social behavior, such as rapid changes in the popularity of media items like videos. Capa...