We have applied various visualization techniques to assist crime analysis. These techniques include a hierarchical list, a hyperbolic tree, a time line tool, a periodic pattern to...
Hsinchun Chen, Homa Atabakhsh, Tim Petersen, Jenni...
The common usage patterns of 2D drivers for the X Window System have changed over time. New extensions such as Render and Composite are creating new demands for 2D rendering which...
Automatic visual inspection plays a growing role in today's efforts to reduce the costs of industrial production. Three to ten months of man power have to be invested for the...
Modern middleware platforms provide the applications deployed on top of them with facilities for their adaptation. However, the level of adaptation support provided by the state-of...
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...