Consider a group of individuals in a strategic environment with moral hazard and adverse selection, and suppose that providing incentives for a given outcome requires a monitor to...
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
With the increasing availability and quality of auditory and haptic means of interaction, it is not unusual to incorporate many modalities in interfaces rather than the purely vis...
Marilyn Rose McGee, Philip D. Gray, Stephen A. Bre...
A new 3D face database that includes a rich set of expressions, systematic variation of poses and different types of occlusions is presented in this paper. This database is unique ...
: Student perceptions of the educational experiences that are provided to them at tertiary institutions do not necessarily match the perceptions of the academics who provide these ...