When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
- Abstract Modeling web site personalization strategies. Personalization is a key factor for differentiating services and retaining customers in World Wide Web sites. On the other ...
Middleware layers placed between user clients and application servers have been used to perform a variety of functions to support the vision of nomadic computing across varying pla...
This paper presents our work on the integrated use of simulation tools in real time for participatory occupational ergonomic studies. The focus of this paper is a synergistic syst...
Shaikh Imtiyaz, Uma Jayaram, Sankar Jayaram, Craig...
We present an accurate, interactive silhouette extraction mechanism for texture-based volume rendering. Compared to previous approaches, our system guarantees silhouettes of a use...