The small size of handheld computers provides the convenience of mobility at the expense of reduced screen space for display and interaction. Prior research [5, 6] has identified ...
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Hobby chefs have various ways to learn cooking—paper recipes or cooking shows, for example. However, information in paper recipes may require prior experience to be understood a...
Sarah Mennicken, Thorsten Karrer, Peter Russell, J...
Concept location is a critical activity during software evolution as it produces the location where a change is to start in response to a modification request, such as, a bug repo...
Gregory Gay, Sonia Haiduc, Andrian Marcus, Tim Men...
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...