: Many defense, homeland security, and commercial security objectives require continuous tracking of mobile entities such as aircraft. The systems that perform these functions prod...
This demonstration will show the application of a unique approach to collecting and analyzing usability data from the users of Web sites and software applications. The NetRaker Su...
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
— In this paper, we propose an original approach to control camera position and/or lighting conditions in an environment using image gradient information. Our goal is to ensure a...