We use 63 features extracted from sources such as versioning and issue tracking systems to predict defects in short time frames of two months. Our multivariate approach covers aspe...
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
How different are two images when viewed by a human observer? Such knowledge is needed in many situations including when one has to judge the degree to which a graphics representa...
David J. Tolhurst, Caterina Ripamonti, C. Alejandr...
In this paper, we address the problem of providing near-field haptic feedback in a wearable, scalable manner. Our solution, called the TactaBoard, supports the independent control...
This paper describes a simple Unix-based repository that supports programming intensive courses. Initially motivated by the need to capture sample artifacts for the capstone cours...