Detecting who is looking at whom during multiparty interaction is useful for various tasks such as meeting analysis. There are two contributing factors in the formation of where a...
The replication of experiments is a key undertaking in SE. Successful replications enable a discipline’s body of knowledge to grow, as the results are added to those of earlier ...
Sira Vegas, Natalia Juristo Juzgado, Ana Mar&iacut...
In this paper, we advocate the problem of reusing Multiplayer Online Game (MOG) in Client-Server (C/S) architecture. The problem is that MOG services cannot continue to be provide...
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
There is an assumption that ontology developers will use a top-down approach by using a foundational ontology, because it purportedly speeds up ontology development and improves qu...