The Terabyte Track explores how adhoc retrieval and evaluation techniques can scale to terabyte-sized collections. For TREC 2004, our first year, 50 new adhoc topics were created ...
Most modern computer systems allow the user to control the space allocated to interfaces through a window system. While much of the understanding of how people interact with windo...
Almost all system and application design for multimedia systems is based around a single user working in isolation to perform some task yet much of the work for which we use comput...
Alan F. Smeaton, Hyowon Lee, Colum Foley, Sin&eacu...
The Northern Region of the USDA Forest Service is using the Ecosystem Management Decision Support System (EMDS) to evaluate ecosystem sustainability for National Forest plan revis...
Mark Jensen, Keith Reynolds, Ute Langner, Melissa ...
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...