This paper describes a computerized aesthetic composition task that is based on a “creativity as search” metaphor. The technique collects detailed, moment-to-moment data about...
Kyle E. Jennings, Dean Keith Simonton, Stephen E. ...
—This paper documents some of the socio-technical issues involved in developing security measures for a community environment, looking at the users of a wireless mesh network dep...
Sara Bury, Johnathan Ishmael, Nicholas J. P. Race,...
Presently, there is no satisfactory model for dealing with political autonomy of agents in policy based management. A theory of atomic policy units called ‘promises’ is therefo...
The development of computer-based devices for music control has created a need to study how spectators understand new performance technologies and practices. As a part of a larger...
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...