Our work focuses on the design of interaction techniques for large information spaces. Our goal is not to define yet another visualization technique but to provide insights for th...
This paper provides four contributions to the study of optimization techniques for component-based distributed realtime and embedded (DRE) systems. First, we describe key challeng...
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
Although publicly-available, ground-truthed corpora have proven useful for training, evaluating, and comparing recognition systems in many domains, the availability of such corpor...
Scott MacLean, George Labahn, Edward Lank, Mirette...
As the number of handicapped people increases worldwide, Intelligent Wheelchairs (IW) are becoming the solution to enable a higher degree of independence for wheelchair users. In a...
Frederico M. Cunha, Rodrigo A. M. Braga, Luí...