This paper describes an ongoing project with the goal of designing and implementing a method to evaluate visualizations based on the tasks supported. The method evaluates time to ...
Octavio Juarez Espinosa, Chris Hendrickson, James ...
Social network-based systems usually suffer from two major limitations: they tend to rely on a single data source (e.g. email traffic), and the form of network patterns is often p...
Yevgeniy Eugene Medynskiy, Nicolas Ducheneaut, Aym...
In this paper, we consider the problem of controlling a 6 DOF holonomic robot and a nonholonomic mobile robot from the projection of 3-D straight lines in the image plane of centra...
Hicham Hadj-Abdelkader, Youcef Mezouar, Philippe M...
—Visualizations of actual run-time data support the comprehension of programs, like examples support the ion of abstract concepts and principles. Unfortunately, the required run-...
Michael Perscheid, Bastian Steinert, Robert Hirsch...
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...