This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...
In this paper we describe experiments with a method to automatically estimate human age from facial images. This system extends recent results with the use of a tensorial represen...
John A. Ruiz-Hernandez, James L. Crowley, Augustin...
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Human interaction proofs (HIPs) have become common place on the internet due to their effectiveness in deterring automated abuse of online services intended for humans. However, th...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...
We investigate how people adapt their strategy for interleaving multiple concurrent tasks to varying objectives. A study was conducted in which participants drove a simulated vehi...