In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Reading techniques are step-by-step procedures that guide individual inspectors while they uncover defects in a software artifact. Reading techniques provide a systematic and well...
This paper describes a different approach to teaching a web-applications course. Rather than lecturing, the instructor organizes material and serves as a guide as students work th...
The early Web was hailed for being easy to use, and what is more important, giving people a chance to participate in its growth. The Web3D was believed to have potential to be the...
Jacek Jankowski, Izabela Irzynska, Bill McDaniel, ...