Support for distributed application management in large-scale networked environments remains in its early stages. Although a number of solutions exist for subtasks of application ...
Jeannie R. Albrecht, Ryan Braud, Darren Dao, Nikol...
A large variety of image features has been invented for detection of objects of a known class. We propose a framework to optimize the discrimination-efficiency tradeoff in integra...
In this paper, we describe the design and evaluation of SMART, an educational system that uses augmented reality for teaching 2nd grade-level concepts, adequate and integrated wit...
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
In a column-restricted covering integer program (CCIP), all the non-zero entries of any column of the constraint matrix are equal. Such programs capture capacitated versions of cov...