In both professional and personal contexts, a common activity is the search for a target image among a collection of images. The presentation of that collection to a user can assu...
Katy Cooper, Oscar de Bruijn, Robert Spence, Mark ...
Current e-learning environments do not provide sufficient support for group collaboration. The absence of the visual identification of the users makes effective collaboration in e...
Katherine G. Franceschi, Ronald M. Lee, David Hind...
Time varying environments or model selection problems lead to crucial dilemmas in identification and control science. In this paper, we propose a modular prediction scheme consisti...
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Effective and efficient requirements negotiation is a key to the success of software development efforts. For large projects, this can be especially difficult to do effectively an...