One of the assumptions of current software for visualizing architecture is that the underlying geometry is a correct, objective, and complete representation of the objects in ques...
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Tables on web pages contain a huge amount of semantically explicit information, which makes them a worthwhile target for automatic information extraction and knowledge acquisition...
Our goal is to define a list of tasks for graph visualization that has enough detail and specificity to be useful to designers who want to improve their system and to evaluators w...
The levels of immersion and presence felt by users in a Virtual Environment (VE) are very important factors that dictate the quality of the Virtual Reality (VR) experience. Sensor...