Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
We describe a virtual mirror interface which can react to people using robust, real-time face tracking. Our display can directly combine a user's face with various graphical ...
Trevor Darrell, Gaile G. Gordon, John Woodfill, Mi...
Adaptive walk on a fitness soundscape [7] is a new kind of interactive evolutionary computation for musical works. This system provides a virtual two-dimensional grid called a “...
Reiji Suzuki, Souichiro Yamaguchi, Martin L. Cody,...
Digital content is not only stored by servers on the Internet, but also on various embedded devices belonging to ubiquitous networks. In this paper, we propose a content processin...
ion visualization is valuable in learning abstract ideas and new concepts. The existing technology for publishing online papers is lacking in terms of user interaction as well as ...