Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Coclustering heterogeneous data has attracted extensive attention recently due to its high impact on various important applications, such us text mining, image retrieval, and bioin...
Large corpora of 3D models, such as Google 3D Warehouse, are now becoming available on the web. It is possible to search these databases using a keyword search. This makes it poss...
Despite growing awareness of the accessibility issues surrounding touch screen use by blind people, designers still face challenges when creating accessible touch screen interface...
Shaun K. Kane, Jacob O. Wobbrock, Richard E. Ladne...
Social media, by its very nature, introduces questions about ownership. Ownership comes into play most crucially when we investigate how social media is saved or archived; how it ...