Knowledge communities of all kinds have social and material practices for deciding what is known and who is to be trusted. In this paper, we address a specific kind of knowledge w...
Nancy A. Van House, Mark H. Butler, Lisa R. Schiff
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Historically, Harvey Mudd College (HMC) has had very little success attracting women to the study of computer science: women have chosen CS less than any other field of study. In...
— While the practical coding scheme [1] has been shown to be able to improve throughput of wireless networks, there still lacks fundamental understanding on how the coding scheme...
Although extensive literature on BPR is available, there is still a lack of concrete guidance on actually changing processes for the better. In this paper we propose and detail out...
Mariska Netjes, Selma Limam Mansar, Hajo A. Reijer...