Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
This paper discusses interactive evolutionary algorithms and their application in swarm-based image generation. From an artist’s perspective, the computer-generated patterns oï¬...
Namrata Khemka, Scott Novakowski, Gerald Hushlak, ...
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. U...
Jay Budzik, Shannon Bradshaw, Xiaobin Fu, Kristian...
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...
Historically, the dominant paradigm in HCI, when it appeared as a field in early 80s, was information processing ("cognitivist") psychology. In recent decades, as the fo...
Bonnie A. Nardi, Edwin Hutchins, James D. Hollan, ...