Social network games embedded within social network sites (SNSs) such as Facebook facilitate play with “Friends” within the SNS. In this study, we look at different dimensions...
Donghee Yvette Wohn, Cliff Lampe, Rick Wash, Nicol...
EventGraphs are social media network diagrams of conversations related to events, such as conferences. Many conferences now communicate a common “hashtag” or keyword to identi...
As government agencies increasingly collaborate with international counterparts on critical global issues, transnational knowledge and information sharing grow in importance. This...
Sharon S. Dawes, Mohammed A. Gharawi, G. Brian Bur...
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
— Decision optimization is used in many applications such as those for finding the best course of action in emergencies. However, optimization solutions require considerable mat...
Alexander Brodsky, Nathan E. Egge, Xiaoyang Sean W...
Open source projects do have requirements; they are, however, mostly informal, text descriptions found in requests, forums, and other correspondence. Understanding of such require...
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
We investigate the decision process as applied to the practical task of choosing a financial portfolio. We developed PortfolioCompare, an interactive visual analytic decision sup...
Anya Savikhin, Hon Cheong Lam, Brian D. Fisher, Da...