Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Emergence of the web and online computing applications gave rise to rich large scale social activity data. One of the principal challenges then is to build models and understandin...
Abstract. Level set methods are a popular way to solve the image segmentation problem in computer image analysis. A contour is implicitly represented by the zero level of a signed ...
In February 2002, more than 50 leaders in the information assurance field warned the President of the United States of a national strategic vulnerability in the country’s inform...
Abstract. Despite a growing body of research on knowledge management (KM) systems, many managers are still unsure how they can implement a KM system that will effectively contribut...
Mark Chun, Kiho Sohn, Priscilla Arling, Nelson F. ...