This paper discusses techniques that improve the performance of a case retrieval system, after it is deployed, as a result of the continued usage of the system, by remembering pre...
The recent popularity of digital media such as CD-ROM and the Internet has prompted exploration of techniques for embedding data, either visibly or invisibly, into text, image, and...
This paper discusses techniques for extracting feature lines from three-dimensional unstructured grids. Our twin objectives are to facilitate the interactive manipulation of these...
This paper discusses techniques for visualizing structure in video data and other data sets that represent time snapshots of physical phenomena. Individual frames of a movie are t...
Cyber attacks continue to increase in sophistication. Advanced attackers often gather information about a target system before launching a precise attack to exploit a discovered v...