One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
In previous work, researchers have attempted to construct taxonomies of information visualization techniques by examining the data domains that are compatible with these technique...
Many CS1 courses lack a breadth in coverage of computing related topics and do not actively engage in nonprogramming computer science topics. In addition, many introductory (and...
This paper introduces an unsupervised vector approach to disambiguate words in biomedical text that can be applied to all-word disambiguation. We explore using contextual informat...
In this study, a method for hierarchical examination and visualization of GSM data using the Self-Organizing Map (SOM) is described. The data is examined in few phases. At first te...