Most data mining algorithms assume static behavior of the incoming data. In the real world, the situation is different and most continuously collected data streams are generated by...
Lior Cohen, Gil Avrahami, Mark Last, Abraham Kande...
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
People often use powerful tools to manage the documents they encounter, but very rarely to store the mental knowledge they glean from those documents. Popcorn is a personal knowle...
Stephen Davies, Scotty Allen, Jon Raphaelson, Emil...
Using a networked infrastructure of easily available sensors and context-processing components, we are developing applications for the support of workplace interactions. Notions o...
During visual analysis, users must often connect insights discovered at various points of time to understand implicit relations within their analysis. This process is often called...