Analyzing and monitoring logs that portray system, user, and network activity is essential to meet the requirements of high security and optimal resource availability. While most ...
In Programming by Example [PBE, also sometimes called "Programming by Demonstration"] systems, the system records actions performed by a user in the interface, and produ...
Robert St. Amant, Henry Lieberman, Richard Potter,...
In this article we present interactive Focus and Context (F+C) visualizations for Augmented Reality (AR) applications. We demonstrate how F+C visualizations are used to affect the...
We present a visualization system for reviewing the turn-taking patterns in a face-to-face meeting. Without the need to directly observe a group, a user can use the system to gain...
Joan Morris DiMicco, Katherine J. Hollenbach, Walt...
Software archives contain historical information about the development process of a software system. Using data mining techniques rules can be extracted from these archives. In th...