The ability to retain and lock members in competitive situations is an important concern of online social network sites. In this study, we proposed a research model to investigate...
Na Shi, Matthew K. O. Lee, Christy M. K. Cheung, H...
In wireless sensor networks (WSNs), energy consumption and data quality are two important issues due to limited energy resources and the need for accurate data. In this scenario, i...
Eduardo Freire Nakamura, Antonio Alfredo Ferreira ...
In this paper, we describe assessment processes at three computer science programs accredited by the Computing Accreditation Commission (CAC) of ABET. Assessment is a vital compon...
Frances K. Bailie, Deborah Whitfield, Adel M. Abun...
We present a new survey metric, the Creativity Support Index (CSI) that is designed to help researchers and designers evaluate the level of creativity support provided by various ...
Erin A. Carroll, Celine Latulipe, Richard Fung, Mi...
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...