Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
This paper begins with an overview of the boundary condition capturing approach to solving problems with interfaces. Although, the authors’ original motivation was to extend the...
Large volumes of content (bookmarks, reviews, videos, etc.) are currently being created on the "Social Web", i.e. on Web 2.0 community sites, and this content is being a...
Uldis Bojars, John G. Breslin, Aidan Finn, Stefan ...
As experimentation becomes one of the de-facto approaches for benchmarking, researchers are turning to testbeds to test, review and verify their work. As a result, several research...
Supporting effective and enjoyable Web usage by people with sensory, motor and cognitive impairments requires more than just accessible Web content. There is an additional task of...
David Sloan, Matthew T. Atkinson, Colin H. C. Mach...