Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Recognition of motions and activities of objects in videos requires effective representations for analysis and matching of motion trajectories. In this paper, we introduce a new r...
—Education of design engineering has started to change in response to the advancement of computer technology. This paper proposes a new design engineering educational framework u...
IMS Learning Design (LD) is a specification that aims at computationally representing any learning process. However, the possibilities of LD to represent collaborative learning sce...
This paper is about people. It is about understanding how learning and communication mutually influence one another; allowing people to infer each other's communicative behavi...