We discuss how the interaction between spam senders and e-mail users can be modelled as a two-player adversary game. We show how the resulting model can be used to predict the str...
Ion Androutsopoulos, Evangelos F. Magirou, Dimitri...
The intrinsic failure mechanisms and reliability models of state-of-the-art MOSFETs are reviewed. The simulation tools and failure equivalent circuits are described. The review in...
Joseph B. Bernstein, Moshe Gurfinkel, Xiaojun Li, ...
For decades, Fitts' law (1954) has been used to model pointing time in user interfaces. As with any rapid motor act, faster pointing movements result in increased errors. But...
Jacob O. Wobbrock, Edward Cutrell, Susumu Harada, ...
Markov models have been widely used for modelling users' navigational behaviour in the Web graph, using the transitional probabilities between web pages, as recorded in the w...
In this paper, we are concerned with the modeling of motion between frames of a video sequence. Typically, it is not possible to represent the motion between frames by a single mod...