Although laboratory user studies are the most common method for validating the utility of information visualization systems, it may be difficult to determine if such studies accu...
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
—When comparing clustering results, any evaluation metric breaks down the available information to a single number. However, a lot of evaluation metrics are around, that are not ...
Elke Achtert, Sascha Goldhofer, Hans-Peter Kriegel...
In this article we describe and evaluate a novel, low interaction cost approach to supporting the spontaneous discovery of geo-tagged information while on the move. Our mobile hap...
Abstract In this paper we compare the behavior of different interest points detectors and descriptors under the conditions needed to be used as landmarks in visionbased simultaneou...