Each day, security companies see themselves confronted with thousands of new malware programs. To cope with these large quantities, researchers and practitioners alike have develo...
Browsing and searching for documents in large, online enterprise document repositories are common activities. While internet search produces satisfying results for most user queri...
Andreas Girgensohn, Frank M. Shipman III, Francine...
Families of products are steadily emerging for distinct settings such as embedded systems, navigational systems, financial applications or even web applications. This shifts the a...
Gentzane Aldekoa, Salvador Trujillo, Goiuria Sagar...
Recent developments in multi-touch technologies have exposed fertile ground for research in enriched humanrobot interaction. Although multi-touch technologies have been used for v...
Mark Micire, Jill L. Drury, Brenden Keyes, Holly A...
Skimming or browsing audio recordings is much more difficult than visually scanning a document because of the temporal nature of audio. By exploiting properties of spontaneous spe...