In real world development environments where deadlines are fixed, a designer must craft a process that works with the team and within the constraints of a project. The traditional...
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
We describe an approach to the development of a digital library system that is founded on a number of basic principles. In particular, we discuss the critical role of metadata in ...
Alexa T. McCray, Marie E. Gallagher, Michael A. Fl...
We address the problem of control-based recovery of robot pose and the environmental lay-out. Panoramic sensors provide us with a 1D projection of characteristic features of a 2D ...
R. Andrew Hicks, David Pettey, Konstantinos Daniil...
CT This paper explores several methods for visualizing the thematic content of large document collections. As opposed to traditional query-driven document retrieval, these methods ...
Nancy Miller, Elizabeth G. Hetzler, Grant Nakamura...