Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
The visual representation of complex data has always been a major motivation for computer graphics. However, there have always been computer graphics scenes which were too complex...
Interactive Storytelling techniques are attracting much interest for their potential to develop new game genres but also as another form of procedural content generation, specific...
David Pizzi, Marc Cavazza, Alex Whittaker, Jean-Lu...
End-user programming provides a unique opportunity to study informal computer science education and knowledge acquisition in the real world. We seek to explore the use of communit...
Visualizations which depict entire information spaces provide context for navigation and browsing tasks; however, the limited size of the display screen makes creating effective g...