New accreditation requirements focus on education as a “continuous improvement process.” The most important part of such a process is that information gets fed back into the s...
In this paper, we present an extensible visualization tool that is being used in a web-based closed laboratory system. The goal of this project is to provide a tool for both stude...
Jungsoon P. Yoo, Sung K. Yoo, Chris Lance, Judy Ha...
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
Analyzing human gait has become popular in computer vision. So far, however, contributions to this topic almost exclusively considered the problem of person identification. In th...
Christian Bauckhage, John K. Tsotsos, Frank E. Bun...
Testing complex Computer-Based Systems is not only a demanding but a very critical task. Therefore the use of models for generating test data is an important goal. Tool support du...