The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
This poster presents ongoing research on how discursive and editing behaviors are regulated on Wikipedia by means of documented rules and practices. Our analysis focuses on three ...
Jonathan T. Morgan, Katie Derthick, Toni Ferro, El...
Parallel and distributed programming is conceptually harder to undertake and to understand than sequential programming, because a programmer often has to manage the coexistence an...
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
The development of new services through the integration of existing ones has gained a considerable momentum as a means to create and streamline business-to-business collaborations...
Boualem Benatallah, Quan Z. Sheng, Anne H. H. Ngu,...