We propose an approach for complex software analysis based on visualization. Our work is motivated by the fact that in spite of years of research and practice, software developmen...
Guillaume Langelier, Houari A. Sahraoui, Pierre Po...
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...
An introductory CS1 course presents problems for educators and students due to students’ diverse background in programming knowledge and exposure. Students who enroll in CS1 als...
When short queries and short image annotations are used in text-based cross-language image retrieval, small changes in word usage due to translation errors may decrease the retriev...
Abstract. We present several results related to ranking. We give a general margin-based bound for ranking based on the L∞ covering number of the hypothesis space. Our bound sugge...