Human-computer interaction research often includes a significant design component. In cases where software or other tools are developed and described, but no empirical evaluation ...
Blaine Hoffman, Helena M. Mentis, Matthew R. Peter...
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Abstract. Comparison between different formalisms and models is often by flattening structure and reducing them to behaviorally equivalent models e.g., automaton and Turing machine...
We have developed a computer vision system, including both facial feature extraction and recognition, that automatically discriminates among subtly different facial expressions. E...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...
In this paper the architectures and usability issues of web-based software tools are discussed. For the development of automobile lighting components, various designers, developers...
Sung H. Ahn, Balaji Bharadwaj, Humayun Khalid, Shu...