Ontology as a discipline of Computer Science has made many claims about its usefulness, however to date there has been very little evaluation of those claims. We present the resul...
Christopher A. Welty, Ruchi Mahindru, Jennifer Chu...
Illustration-inspired techniques have provided alternative ways to visualize time-varying data. Techniques such as speedlines, flow ribbons, strobe silhouettes and opacity-based t...
Distance measures like the Euclidean distance have been the most widely used to measure similarities between feature vectors in the content-based image retrieval (CBIR) systems. H...
Riadh Ksantini, Djemel Ziou, Bernard Colin, Fran&c...
■ An important aspect of cognitive control is the ability to respond with restraint. Here, we modeled this experimentally by measuring the degree of response slowing that occurs...
Sara Jahfari, Cathy M. Stinear, Mike Claffey, Fred...
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...