Until recently, parallel programming has largely focused on the exploitation of data-parallelism in dense matrix programs. However, many important application domains, including m...
Milind Kulkarni, Martin Burtscher, Calin Cascaval,...
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Abstract. Due to the significant increase of peer-to-peer (P2P) traffic in the past few years, more attentions are put on designing effective methodologies of monitoring and ide...
Tom Z. J. Fu, Yan Hu, Xingang Shi, Dah-Ming Chiu, ...
This paper presents a spatial-semantic modeling system featuring automated learning of object-place relations from an online annotated database, and the application of these relat...
Pooja Viswanathan, David Meger, Tristram Southey, ...
In this paper we explored the relationship between metacognitive statements and learning gains with students’ typed and spoken interactions with an intelligent tutoring system, c...
Jeremiah Sullins, Moongee Jeon, Sidney K. D'Mello,...