As HCI embraces experience design, it will increasingly rely on new elicitation methods that are capable of drawing out the multi-faceted subjectivities of individuals without bei...
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
We show that the relevant information of a supervised learning problem is contained up to negligible error in a finite number of leading kernel PCA components if the kernel matche...
Mikio L. Braun, Joachim M. Buhmann, Klaus-Robert M...
We present a tool and a methodology for estimating the memory storage requirement for synchronous real-time video processing systems. Typically, a designer will use the feedback i...
: Context-aware ubiquitous computing environments tend to be highly distributed and heterogeneous, while also featuring increased dynamism as elements, devices and middleware compo...
John Soldatos, Kostas Stamatis, Siamak Azodolmolky...