MobileASL, a software program enabling sign-language video on mobile devices over conventional U.S. cellular networks, was evaluated in a three-week field study during the summer ...
Joy Kim, Jessica J. Tran, Tressa W. Johnson, Richa...
Benchmarking pattern recognition, machine learning and data mining methods commonly relies on real-world data sets. However, there are some disadvantages in using real-world data....
Janick V. Frasch, Aleksander Lodwich, Faisal Shafa...
In this paper we describe a cluster-based plagiarism detection method, which we have used in the learning management system of SCUT to detect plagiarism in the network engineering ...
We report on a study of the English edition of Wikipedia in which we used a mixed methods approach to understand how nested organizational structures called WikiProjects support c...
Andrea Forte, Niki Kittur, Vanessa Larco, Haiyi Zh...
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...