In the research described here, we have constructed at tightly coupled set of methods for monitoring, steering, and applying visual analysis to large scale simulations. This work ...
Yves Jean, Thomas Kindler, William Ribarsky, Weimi...
The procedures to collect information about users are well known in computer science till long time. They range from getting explicit information from users, required in order to ...
Abstract. Self-efficacy is an individual's belief about her ability to perform well in a given situation. Because selfefficacious students are effective learners, endowing int...
Scott W. McQuiggan, Bradford W. Mott, James C. Les...
Message Sequence Charts (MSCs) are a widely used visual formalism for scenario-based specifications of distributed reactive systems. In its conventional usage, an MSC captures an ...
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...