In this paper, we explore several extensions to surface pasting. In particular, using the task of modelling a ferret as a driving force, we improved the user interface for cylindr...
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
This article presents the design, implementation and use of a remote network lab with multiple users support as an aid to teaching computer networks. The purpose is to enable mult...
Marco Aravena Vivar, Cristian Rodriguez, Andres Ra...
Establishing that machines cannot automate creative design and that it is a difficult task for humans, I propose a computational model based on the human and machine complementari...
Design is a complex process often described as a collaboration between a designer and herself. In architectural design, a designer must consider the selection of a subset of actio...
Brett Bojduj, Ben Weber, Kai-Florian Richter, Sven...