Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Much existing documentation is informal and serves to communicate "how-to" knowledge among restricted working groups. Using current practices, such documentation is both...
Madhu Prabaker, Lawrence D. Bergman, Vittorio Cast...
Management of clutter is an important factor in the design of user interfaces and information visualizations, allowing improved usability and aesthetics. However, clutter is not a...
Ruth Rosenholtz, Yuanzhen Li, Jonathan Mansfield, ...
The ESC/Java tool was a lauded advance in effective static checking of realistic Java programs, but has become out-of-date with respect to Java and the Java Modeling Language (JML...
More and more web users keep up with newest information through information streams such as the popular microblogging website Twitter. In this paper we studied content recommendat...
Jilin Chen, Rowan Nairn, Les Nelson, Michael Berns...