Recently, spammers have proliferated "image spam", emails which contain the text of the spam message in a human readable image instead of the message body, making detect...
—Cellular networks operating with a frequency reuse factor of one are often interference-limited. For that reason, base station (BS) cooperation techniques aiming at mitigating t...
This paper explores unexpected results that lie at the intersection of two common themes in the KDD community: large datasets and the goal of building compact models. Experiments ...
In this paper, we present ThumbSpace, a software-based interaction technique that provides general one-handed thumb operation of touchscreenbased mobile devices. Our goals are to p...
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...