Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
The location of the optic disc is of critical importance in retinal image analysis. In this work we improve on an approach introduced in [3] who localised an optic disc region thr...
Alireza Osareh, Majid Mirmehdi, Barry T. Thomas, R...
With the increasing number of cars on the road, longer commutes, and the proliferation of complex information and entertainment features, there is a greater need for careful inter...
David M. Krum, Dietrich Manstetten, Clifford Nass,...
The evaluation of paper prototypes is normally conducted in controlled settings such as a usability lab. This paper, in contrast, reports on a study where evaluations of a paper p...
David G. Hendry, Sara Mackenzie, Ann Kurth, Freya ...
We discuss findings from observation, interviews, and textual analysis of instant messaging use in a university research lab setting. We propose a method for characterizing the te...