We describe a virtual “tether” for mobile devices that allows groups to have quick, simple and privacy-preserving meetups. Our design provides cues which allow dynamic coordin...
John Williamson, Simon Robinson, Craig Stewart, Ro...
Recent findings have shown that humans can adapt their internal control model to account for the changing dynamics of systems they manipulate. In this paper, we explore the effect...
Ali Israr, Hakan Kapson, Volkan Patoglu, Marcia Ki...
The computation of high-fidelity images in real-time remains one of the key challenges for computer graphics. Recent work has shown that by understanding the human visual system,...
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
The vision of semantic interoperability, the fluid sharing of digitalized knowledge, has led much research on ontology/schema mapping/aligning. Although this line of research is f...
Hung-Ju Chu, Randy Y. C. Chow, Su-Shing Chen, Raja...