As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
Data mining techniques frequently find a large number of patterns or rules, which make it very difficult for a human analyst to interpret the results and to find the truly interes...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Weimin Xia...
Interactive synthetic environments are currently used in a wide variety of applications, including video games, exposure therapy, education, and training. Their success in such do...
Academic conferences provide a social space for people to present their work, learn about others’ work, and interact informally with one another. However, opportunities for inte...
Joseph F. McCarthy, David W. McDonald, Suzanne Sor...
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...