In many interactive scenarios, the fast recognition and localization of crucial information is very important to effectively perform a task. However, in information visualization...
—While the animation and rendering techniques used in the domain of textile simulation have dramatically evolved during the last two decades, the ability to manipulate and modify...
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Abstract--This paper describes an interactive tool for constrained clustering that helps users to select effective constraints efficiently during the constrained clustering process...
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...