We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
We present TimeNets, a new visualization technique for genealogical data. Most genealogical diagrams prioritize the display of generational relations. To enable analysis of famili...
Operative reconstruction of fractured orbital floors must among others ensure equal volumes for left and right sides. In this paper, we present Thomas M. Deserno1 Wei Liao1 a plan...
Melanie Kleiner, Dirk Schulze, Pit Jakob Voss, Tho...
This paper introduces a new corpus of consulting dialogues designed for training a dialogue manager that can handle consulting dialogues through spontaneous interactions from the ...
Kiyonori Ohtake, Teruhisa Misu, Chiori Hori, Hidek...
Warping the pointer across monitor bezels has previously been demonstrated to be both significantly faster and preferred to the standard mouse behavior when interacting across dis...