Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Prior research suggests people have trouble juggling effort across multiple projects with multiple partners. We investigated this problem, with an experiment where groups of four ...
Peter Scupelli, Susan R. Fussell, Sara B. Kiesler,...
—We present an example-based learning approach for locating vertical frontal views of human faces in complex scenes. The technique models the distribution of human face patterns ...
This paper describes a mode detection system for online pen input that employs a Bayesian network to combine classification results and context information. Previous monolithic c...
The multistage detection algorithm has been proposed as an effective interference cancellation scheme for next generation Wideband Code Division Multiple Access (W-CDMA) base stati...
Gang Xu, Sridhar Rajagopal, Joseph R. Cavallaro, B...