Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Community QA portals provide an important resource for non-factoid question-answering. The inherent noisiness of user-generated data makes the identification of high-quality cont...
A common observation when working on physically large displays, such as wall-sized projection, is that a certain amount of information privacy is lost. A common explanation for th...
Emergency management is more than just events occurring within an emergency situation. It encompasses a variety of persistent activities such as planning, training, assessment, and...
Much work in software architecture has been inspired by work in physical architecture, in particular Alexander’s work on ‘design patterns’. By contrast, Alexander’s work i...
Stephen Rank, Carl O'Coill, Cornelia Boldyreff, Ma...