The widespread adoption of automated vehicle location systems (AVL) and automatic passenger counters (APC) in the transit industry has opened new venues in operations and system mo...
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abstract— We developed an automated environment to measure the memory access behavior of applications on high performance clusters. Code optimization for processor caches is cruc...
Information about the location and size of the targets that users interact with in real world settings can enable new innovations in human performance assessment and software usab...
The retrieval performance of content-based image retrieval (CBIR) systems is often disappointingly low, mainly due to the subjectivity of human perception. Relevance feedback (RF)...
Sotirios Chatzis, Anastasios D. Doulamis, Theodora...