Effective extraction of query relevant information present within documents on the web is a nontrivial task. In this paper we present our system called QueSTS, which does the abov...
M. Sravanthi, C. Ravindranath Chowdary, P. Sreeniv...
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Models of activity structure for unconstrained environments are generally not available a priori. Recent representational approaches to this end are limited by their computational...
Raffay Hamid, Siddhartha Maddi, Aaron F. Bobick, I...
—A fully-articulated visual representation of a user in an immersive virtual environment (IVE) can enhance the user’s subjective sense of feeling present in the virtual world. ...
Gerd Bruder, Frank Steinicke, Kai Rothaus, Klaus H...
A degradation model that describes many image degradations produced by desktop scanning is used to study the edge noise that is present in bilevel document images. The standard de...
Craig McGillivary, Chris Hale, Elisa H. Barney Smi...