Although there are a large number of academic and industrial model transformation frameworks available, allowing specification, implementation, maintenance and documentation of mod...
Behzad Bordbar, Gareth Howells, Michael Evans, Ath...
Access to real environments is often conditioned by a number of issues, including the skills of the user (i.e. affected by aging, physical and psychological deficiencies, etc.) an...
We describe a case study in the design of a user interface to a digital library. Our design stems from a vision of a library as a channel to the vast array of digital information ...
Steve B. Cousins, Andreas Paepcke, Terry Winograd,...
Several recently proposed infrastructures permit client applications to interact with distributed network-accessible services by simply ”plugging in” into a substrate that pro...
Anca-Andreea Ivan, Josh Harman, Michael Allen, Vij...
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...