This paper presents a multi-layered valuation framework for pricing investment advisory services, using service modules as product specification and a reference base for pricing. ...
Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Finding images over the internet can be trying at best. Many industries such as advertising, marketing, image consultants, print media, and medical imaging deal with electronic im...
In our paper last year [1], we described our languagetraining program, which utilizes Baldi as a tutor, who guides students through a variety of exercises designed to teach vocabu...
Dominic W. Massaro, Slim Ouni, Michael M. Cohen, R...
This paper attempts to create a research cycle for Problem Based Learning and in so doing help substantiate the use of PBL in business school environments. The paper starts with a...
Large-scale, group-to-group collaboration is an emerging trend, yet has so far not received much attention. We performed an ethnographic study to examine how interaction and perce...
Contracting out government services, especially IT services, has accelerated in recent years in the United States. Based on literature in privatization and contracting out, the au...
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. Blob analysis, a method for analyzing the movement of the head and hands bas...
Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas...
NASA space exploration should largely address a problem class in reliability and risk management stemming primarily from human error, system risk and multi-objective trade-off ana...