Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
The LAOS model, a 5-layer adaptive hypermedia (AH) authoring model, was previously shown to specify a flexible framework for (collaborative) creation of material for the semantic ...
We propose a benchmarking technique that is combined with customer's cognitive structures. Customer's cognitive structures are determined using a multi-dimensional scali...
Cheul Rhee, Junghoon Moon, G. Lawrence Sanders, Yo...
Scan-based silicon debug is a technique that can be used to help find design errors in prototype silicon more quickly. One part of this technique involves the inclusion of breakpo...
Bart Vermeulen, Mohammad Zalfany Urfianto, Sandeep...