We present a new popup widget, called CoR2Ds (Context-Rooted Rotatable Draggables), designed for multi-user direct-touch tabletop environments. CoR2Ds are interactive callout popu...
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Abstract--Conducting valid comparative evaluations of techniques in the field of Music Information Retrieval (MIR) presents particular challenges to MIR researchers due to issues o...
Kris West, Amit Kumar, Andrew Shirk, Guojun Zhu, J...
– The use of design patterns such as the GRASP (General Responsibility Assignment Software Principles) or GoF (Gang-of-Four) patterns in software engineering has been well-docume...
Cyril S. Ku, Thomas J. Marlowe, Tatyana Budanskaya...