This paper describes the research and design of three tangible and embodied prototypes that aim to enable users to meaningfully engage with an artifact's historical context a...
Jamie Kwan, Jean Ho Chu, Daniel Harley, Melanie Mc...
We consider network cost-sharing games with non-anonymous cost functions, where the cost of each edge is a submodular function of its users, and this cost is shared using the Shap...
Abstract—Many-objective optimization has posed a great challenge to the classical Pareto-dominance based multi-objective evolutionary algorithms. In this paper, an evolutionary a...
—This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows ...
—It is often a difficult task to accurately segment images with intensity inhomogeneity, because most of representative algorithms are region-based that depend on intensity homo...
—We present an application of gesture recognition using an extension of Dynamic Time Warping (DTW) to recognize behavioural patterns of Attention Deficit Hyperactivity Disorder ...
Abstract—This paper presents salient features of humanhuman interaction where one person with limited auditory and visual perception of the environment (a follower) is guided by ...
—Automatic continuous affective state prediction from naturalistic facial expression is a very challenging research topic but very important in human-computer interaction. One of...