We present an approach to enhancing information access through web structure mining in contrast to traditional approaches involving usage mining. Specifically, we mine the hardwi...
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
We describe the design and implementation of a videobasedaugmentedreality system capableof overlayingthreedimensional graphical objects on live video of dynamic environments. The ...
We present a study of using camera-phones and visual-tags to access mobile services. Firstly, a userexperience study is described in which participants were both observed learning ...
Eleanor F. Toye, Richard Sharp, Anil Madhavapeddy,...