Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
This working in progress paper describes the development of a web service that provides a 3D (VRML) virtual environment for automated management and exhibition of imagery data. Wi...
: Resonance (Gibson, 1986) of users while interacting with a product should be a key issue in the development of human computer interaction. Because resonance requires developing o...
We develop a computational model of shape that extends existing Riemannian models of shape of curves to multidimensional objects of general topological type. We construct shape sp...
Xiuwen Liu, Yonggang Shi, Ivo D. Dinov, Washington...
: We present several quality criteria for skills management initiatives based on the competence-performance approach [Kor97]. The criteria help to measure reliability and validity ...