Explosive increase in end-user computing on distributed systems requires that end-users develop application software by themselves. One solution is given as aformula of "adom...
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
This paper discusses the key collaborative features of scientific visualization systems. An experiment with several groups of users has been conducted to evaluate the usability an...
We describe an automatic classroom capture system that detects and records significant (stable) points in lectures by sampling and analyzing a sequence of screen capture frames fr...
Paul E. Dickson, W. Richards Adrion, Allen R. Hans...
This paper describes a system which uses multiple visual processes to detect and track faces for video compression and transmission. The system is based on an architecture in whic...