Choosing the appropriate type of video input is an important issue for any vision-based system and the right decision must take into account the specific requirements of the inten...
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
This report illustrates the use of qualitative methods and an interpretive framework (Cultural Historical Activity Theory) to examine educational interventions. The techniques are...
We describe the Image Tagger system – a web-based tool for supporting collaborative image indexing by students. The tool has been used in three successive graduate-level classes ...
Palakorn Achananuparp, Katherine W. McCain, Robert...
In this paper, we describe our Computer Science Program Assessment (COMPASS) project. COMPASS uses open-source software tools to support the development and analysis of course por...