This paper presents a design methodology that deals with the presentation aspects involved in the development of a Semantic Web Information System. The methodology is driven by tw...
Flavius Frasincar, Geert-Jan Houben, Peter Barna, ...
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
We conducted a 2.5 week longitudinal study with five motor impaired (MI) and four non-impaired (NMI) participants, in which they learned to use the Vocal Joystick, a voice-based u...
Susumu Harada, Jacob O. Wobbrock, Jonathan Malkin,...
This paper presents elastic buffers (EBs), an efficient flow-control scheme that uses the storage already present in pipelined channels in place of explicit input virtualchannel b...
George Michelogiannakis, James D. Balfour, William...
Existing data-stream clustering algorithms such as CluStream are based on k-means. These clustering algorithms are incompetent to find clusters of arbitrary shapes and cannot hand...