In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
This study investigates whether deception in online dating profiles is detectable through a linguistic approach, which assumes that liars nonconsciously produce different word pat...
This project studied the influence of kinesthetic intelligences on creativity in young children. To understand this relationship preschoolers were observed in their daycare setti...
Volunteered geographic information such as that available in blogs, wikis, social networking sites, and community contributed photo collections is enabling new applications. This ...
Speaker clustering is the task of grouping a set of speech utterances into speaker-specific classes. The basic techniques for solving this task are similar to those used for spea...