While web search tasks are often inherently collaborative in nature, many search engines do not explicitly support collaboration during search. In this paper, we describe HeyStaks...
Kevin KcNally, Michael P. O'Mahony, Barry Smyth, M...
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
The WWW has made information and services more available than ever before. Many of the first Web applications have been emulations of real world activities, in particular, e-comme...
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie