A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Studies of interactive systems in museums have raised important design considerations, but so far have failed to address sufficiently the particularities of family interaction and...
Tom Hope, Yoshiyuki Nakamura, Toru Takahashi, Atsu...
Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devi...
Andreas Klenk, Frank Petri, Benoit Radier, Mika&eu...
In this demonstration, we are going to illustrate how to give a presentation using multiple displays connected to the Internet. Categories and Subject Descriptors H.4.3 [Communica...
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...