Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
UN/CEFACT’s Modelling Methodology (UMM) is used to analyze and design B2B business processes. We extend UMM by a constraint mechanism for adding business environment-specific co...
A group of friends visiting a crowded and noisy music festival is an example of a situation where knowing the location of other people is important, but where external factors, su...
Humans continuously assess one another's situational context, modify their own affective state, and then respond based on these outcomes through empathetic expression. Virtua...
Scott W. McQuiggan, Jennifer L. Robison, Robert Ph...
Background: Gene Ontology (GO) characterizes and categorizes the functions of genes and their products according to biological processes, molecular functions and cellular componen...
Hongmei Sun, Hong Fang, Tao Chen, Roger Perkins, W...