: Large amounts of protein and domain interaction data are being produced by experimental high-throughput techniques and computational approaches. To gain insight into the value of...
Andreas Schlicker, Carola Huthmacher, Fidel Ram&ia...
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
In this paper we present the integration of graph-based visual perception to spoken conversation in human-robot interaction. The proposed architecture has a dialogue manager as the...
Some wearable computing applications require sensing devices that detect the deflection of joints during human motion. Presented here is a novel non-invasive technique for measuri...
Many interfaces allow users to manipulate graphical objects, icons representing underlying data or the data themselves, against a spatial backdrop or canvas. Users take advantage ...
Frank M. Shipman III, Catherine C. Marshall, Thoma...