To be provocative, it could be argued that information visualization is a tool in search of an application. This viewpoint becomes most apparent when one seeks to adopt and adapt ...
Orlena Gotel, Francis T. Marchese, Stephen J. Morr...
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
We analyze generalization and learning in XCS with gradient descent. At first, we show that the addition of gradient in XCS may slow down learning because it indirectly decreases...
Pier Luca Lanzi, Martin V. Butz, David E. Goldberg
We report the results of a long-term, multi-site field trial of a situated awareness device for families called the “Whereabouts Clock”. The Clock displayed family members’ c...
Barry A. T. Brown, Alex S. Taylor, Shahram Izadi, ...