In this paper, we present a view of design methods as discourse on practice. We consider how the deployment of a particular set of design methods enables and constrains not only p...
Marisa Leavitt Cohn, Susan Elliott Sim, Paul Douri...
Requirements prioritization is recognized as an important activity in product development. In this paper, we describe the current state of requirements prioritization practices in ...
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
This paper describes our work in examining the question of whether providing a visual informatics application in an educational scenario, in particular, providing video content ana...