When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
This paper describes a system that uses a camera and a point light source to track a user's hand in three dimensions. Using depth cues obtained from projections of the hand a...
This paper describes the architecture of a data level comparative visualization system and experiences using it to study computational fluid dynamics data and experimental wind tu...
Realism has always been a goal in computer graphics. However, the algorithms involved in mimicking ical world are often complex, abstract, and sensitive to changes in experimental...
— Structured peer-to-peer systems have emerged as infrastructures for resource sharing in large-scale, distributed, and dynamic environments. One challenge in these systems is to...