Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
Information retrieval is generally considered an individual activity, and information retrieval research and tools reflect this view. As digitally mediated communication and infor...
Steven E. Poltrock, Jonathan Grudin, Susan T. Duma...
In this paper, the problem of processing audio signals is addressed in the context of query-by-humming systems. Since singing is naturally used as input, we aim to develop a front...
We present a new concept for the extension of epipolar image analysis to more general camera configurations like circular camera movements usually occuring for concentric mosaic ...
Learning a foreign language is a long, error-prone process, and much of a learner’s time is effectively spent studying vocabulary. Many errors occur because words are only partl...