Current methods to represent system or task usability in a single metric do not include all the ANSI and ISO defined usability aspects: effectiveness, efficiency & satisfactio...
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Research has identified the potential and challenges of information sharing in government settings mostly within the context of a single country. The challenges facing inter-gover...
Celene Navarrete, Sehl Mellouli, Theresa A. Pardo,...
Accurate corneal layer boundary extraction from optical coherence tomography can provide precise layer thickness measurements required in the analysis of corneal disease. This pap...
Justin A. Eichel, Akshaya Kumar Mishra, Paul W. Fi...
Abstract—Gold farming refers to the illicit practice of gathering and selling virtual goods in online games for real money. Although around one million gold farmers engage in gol...
Muhammad Aurangzeb Ahmad, Brian Keegan, Jaideep Sr...