Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
—We introduce methods for detecting in real-time information concerning bites taken during a meal. Our methods use an orientation sensor placed on the wrist of a user, and analyz...
In this work, we investigate the viability of a novel combination of evoked responses as input signals for a general-purpose brain-machine interface (BMI). We demonstrate response...
Rudolph L. Mappus IV, Paul M. Corballis, Melody Mo...