End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
In this paper we propose an attention-based vision system for the JAST interactive dialog robot. The robotic vision system incorporates three submodules: object recognition, gestu...
I present an approach to designing decision support systems. The approach is to dissect a decision from both a normative and a cognitive perspective, and then to design a diagram ...
Exploratory data analysis is a process of sifting through data in search of interesting information or patterns. Analysts’ current tools for exploring data include database mana...
The rapid progress of biotechnology provides an increasing number of life science databases. These databases have been operated and managed individually on the Internet. Under such...