The size and high rate of change of source code comprising a software system make it difficult for software developers to keep up with who on the team knows about particular parts...
Thomas Fritz, Jingwen Ou, Gail C. Murphy, Emerson ...
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
This paper presents a framework and system to evaluate the accessibility of web pages according to the individual requirements of users with disabilities. These requirements not o...
Markel Vigo, Alfred Kobsa, Myriam Arrue, Julio Aba...
The realization of Semantic Web vision is based on the creation and use of semantic web content which needs software tools both for semantic web developers and end users. Over the ...
Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter weight checksum techn...