Drawing on our previous work on survey and reporting tools that compare faculty expectations with what students report experiencing in class, this paper presents details of a new ...
Judith Ann Ouimet, Sermsak Buntha, Sergiu M. Dasca...
Software systems need to change over time to cope with new requirements, and due to design decisions, the changes happen to crosscut the system’s structure. Understanding how ch...
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...
Abstract—We analyze the carrier sensing and interference relations between the two wireless links and measure the impact of these relations on link capacity in two indoor 802.11a...
Jeongkeun Lee, Sung-Ju Lee, Wonho Kim, Daehyung Jo...
— Existing human performance taxonomies which mostly can answer the question “what factors could affect the result” rather than “why it happened”, are usually used to ana...