This paper presents an interactive analysis and visualization framework for behavior histories, called mPATH framework. In ubiquitous computing environment, it is possible to infe...
Some theoretical models used in IS research may lack explanatory power and consistency because of their failure to provide an adequate means of accounting for contextual and situa...
Many computational tools for the simulation and design of emergency evacuation and egress are now available. However, due to the scarcity of human and social behavioral data, thes...
Xiaoshan Pan, Charles S. Han, Ken Dauber, Kincho H...
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Interaction graphs are ubiquitous in many fields such as bioinformatics, sociology and physical sciences. There have been many studies in the literature targeted at studying and m...