In this paper we explore the use of computer at home. This work is based on the automatic recording of application focus data in natural situation from a wide representative panel...
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
Simulation results are often needed within a short time frame, while the development of simulation models can be time consuming. We develop a methodology to facilitate rapid gener...
Gabriel A. Burnett, Deborah J. Medeiros, Daniel A....
nts have recently emerged as a valuable abstraction for characterizing interactions among autonomous agents at the level of their business relationships. Traditionally, interopera...
Abstract. UML models consist of several diagrams of different types describing different views of a software system ranging from specifications of the static system structure to de...