— As new versions of software are developed bugs inevitably arise either due to regression or new functionality. Challenges arise in discovering, managing, and testing the impact...
Kevin J. Hoffman, Murali Krishna Ramanathan, Patri...
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Learning semantics from annotated images to enhance content-based retrieval is an important research direction. In this paper, annotation data are assumed available for only a sub...
Although emotions elicited by the fictional world or the artefact play a part in story-driven video games, they are certainly not the focus of the experience. From a cognitive psy...
This paper continues the movement from technology centered to human centered approaches in the study of tasks that involve finding, understanding, and using information, and tools...