This paper presents a novel image editing program emphasizing easy selection and manipulation of material found in informal, casual documentssuch as sketches, handwrittennotes, wh...
Eric Saund, David J. Fleet, Daniel Larner, James M...
Abstract. We report our work towards building user models of learner’s development based upon evidence of their interactions with an e-learning website composed of multimedia lea...
Video surveillance systems seek to automatically identify events of interest in a variety of situations. Extracting a moving object from background is the most important step of t...
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...