Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
The visually impaired have limited access to the world of mobile devices. Our goal was to design a handheld mobile device to overcome limitations such as reliance on visual displa...
Robert A. Amar, Steven Dow, Richard Gordon, Muhamm...
As the field of information visualization matures, the tools and ideas described in our research publications are reaching users. The reports of usability studies and controlled e...
We propose novel algorithms for organizing large image and video datasets using both the visual content and the associated sideinformation, such as time, location, authorship, and...
architectures at multiple levels of abstraction, encompassing both hardware and software. It has five modes of operation (Design, Model Validation, Build Simulation, Simulate Syste...
Paul S. Coe, Fred W. Howell, Roland N. Ibbett, Lau...