In previous work, we proposed ValueCharts, a set of visualizations and interactive techniques to support the inspection of linear models of preferences. We now identify the need t...
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
—This paper presents a system-level Network-on-Chip modeling framework that integrates transaction-level model and analytical wire model for design space exploration. It enables ...
This paper describes a system for handwritten Chinese text recognition integrating language model. On a text line image, the system generates character segmentation and word segme...
Abstract. A hybrid workflow system could be treated as a domain-across infrastructure by incorporating different workflow systems and WfMSs engaged in the complex business processi...
Wan-Chun Dou, Shing-Chi Cheung, Guihai Chen, Jie W...