With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
Linking components with end-user requests for processing is problematic when there are fundamental language differences between component specifications and how individual users s...
Rose F. Gamble, Robert Baird, Leigh Flagg, Melody ...
In this paper, we introduce a compact system for fusing location data with data from simple, low-cost, non-location sensors to infer a user’s place and situational context. Speci...
Evan Welbourne, Jonathan Lester, Anthony LaMarca, ...
We introduce a method for actively controlling the illumination in a room so that it is consistent with a virtual world. In combination with a high dynamic range display, the syst...
Abhijeet Ghosh, Matthew Trentacoste, Helge Seetzen...
– Building large software systems out of existing software components can save time and cost. These software components range from architectural and design components to binary c...