This paper details a visual concept ontology driven knowledge acquisition methodology. We propose to use a visual concept ontology to guide experts in the visual description of the...
At the intersection of tele-robotics, computer networking, and human social interaction we have chosen to explore an area we identifyas personal tele-embodiment. At the core of th...
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
In this paper, a new approach for navigation assistance through sets of volumetric data is presented. This innovative method uses force feedback in two dimensions to guide the use...
Recently a new algorithm for reverse engineering of biochemical networks was developed by Laubenbacher and Stigler. It is based on methods from computational algebra and finds mos...