Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
This paper describes an interactive method for generating a model of a scene from image data. The method uses the camera parameters and point cloud typically generated by structur...
Anton van den Hengel, Anthony R. Dick, Thorsten Th...
In recent years, Internet surveys have been widely used by researchers and companies as a means of data collection. However, few IS studies have discussed the validation of Intern...
In a Computational Grid which consists of many computer clusters, job start time predictions are useful to guide resource selections and balance the workload distribution. However...
Hui Li, David L. Groep, Jeffrey Templon, Lex Wolte...
A method to induce bayesian networks from data to overcome some limitations of other learning algorithms is proposed. One of the main features of this method is a metric to evalua...