An original methodology, called backward model tracing to model student performance which features a profitable integration of the bug collection and bug construction techniques i...
Shot boundary detection The shot boundary detection system in 2007 is basically the same as that of last year. We make three major modifications in the system of this year. First,...
Jinhui Yuan, Zhishan Guo, Li Lv, Wei Wan, Teng Zha...
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Software systems must face two challenges today: growing complexity and increasing parallelism in the underlying computational models. The problem of increased complexity is often...
We propose a simple and interactive technique for volume illustration by using the difference between the original intensity values and a low-pass filtered copy. This difference, ...