Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
We examine the law of steering – a quantitative model of human movement time in relation to path width and length previously established in hand drawing movement – in a VR loc...
Abstract. A smart transducer network hosts various nodes with different functionality. Our approach offers the possibility to design different smart transducer nodes as a system...
Martin Delvai, Ulrike Eisenmann, Wilfried Elmenrei...
This paper presents metaViz, an online application that uses computational metaphor identification to find conceptual metaphors in political blogs. The application presents those ...
Eric P. S. Baumer, Jordan Sinclair, David Hubin, B...
This paper describes an infrastructure that enables transparent development of image processing software for parallel computers. The infrastructure’s main component is an image ...