The Internet topology data collected through traceroute exploration has been extensively studied in the past. In particular, a remarkable property of the Internet, the power-law s...
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Objective Lack of dose adjustment for renally cleared drugs in the presence of poor renal function is a common problem in the hospital setting. The absence of a clinical decision ...
Gregory W. Roberts, Christopher J. Farmer, Philip ...
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
Despite growing awareness of the accessibility issues surrounding touch screen use by blind people, designers still face challenges when creating accessible touch screen interface...
Shaun K. Kane, Jacob O. Wobbrock, Richard E. Ladne...