Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
This paper presents a CBIR system that is based on a segmented representation of image content. It compares regional features using fuzzy similarity, which have been shown to be ps...
Noun extraction is very important for many NLP applications such as information retrieval, automatic text classification, and information extraction. Most of the previous Korean ...
In e-testing it is important to administer tests composed of good quality question items. By the term “quality” we intend the potential of an item in effectively discriminating...
Abstract. In this paper, we introduce the concept of rule-based visualization for a computational steering collaboratory and show how these rules can be used to steer the behaviors...
Lian Jiang, Hua Liu, Manish Parashar, Deborah Silv...