We introduce layer operations for single-view 3D deformable object manipulation, in which the user can control the depth order of layered 3D objects resting on a flat ground with...
In this work the feasibility of building a socially aware badge that learns from user activities is explored. A wearable multisensor device has been prototyped for collecting data ...
In information system development, end-users often participate in design and in many cases learn to design their own system. Design, however, requires a distinct approach that use...
One of the challenges with using mobile touch-screen devices is that they do not provide tactile feedback to the user. Thus, the user is required to look at the screen to interact...
Visualization for software understanding requires that the user be able to define specific visualizations that are specialized to the particular understanding task at hand. In t...
For a wireless network to effectively deliver services to the mobile users, it must have an efficient way to track them. The location management fulfills this task through locat...
We present a novel system and methodology for browsing and exploring topics and concepts within a document collection. The process begins with the generation of multiple taxonomie...
W. Scott Spangler, Jeffrey T. Kreulen, Justin Less...
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
In this paper we describe an adaptation method for adaptive hypermedia systems, consisting in personalized guided routes for the SEM-HP model. SEM-HP is a layered, systemic, semant...
Nuria Medina-Medina, Fernando Molina-Ortiz, Lina G...
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...