This paper describes the research and design of three tangible and embodied prototypes that aim to enable users to meaningfully engage with an artifact's historical context a...
Jamie Kwan, Jean Ho Chu, Daniel Harley, Melanie Mc...
We consider network cost-sharing games with non-anonymous cost functions, where the cost of each edge is a submodular function of its users, and this cost is shared using the Shap...
Abstract—Many-objective optimization has posed a great challenge to the classical Pareto-dominance based multi-objective evolutionary algorithms. In this paper, an evolutionary a...
—This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows ...
—It is often a difficult task to accurately segment images with intensity inhomogeneity, because most of representative algorithms are region-based that depend on intensity homo...