Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
With the growing volumes of data, exploring the relationships within the huge amounts of data is difficult. Information visualization uses the human perception system to assist use...
Visualizing 3D flow fields intrinsically suffers from problems of clutter and occlusion. A common practice to alleviate these issues is to restrict the visualization to feature su...
Digital interactive information displays are becoming more common in public spaces such as museums, galleries, and libraries. However, the public nature of these locations requires...
Uta Hinrichs, Holly Schmidt, M. Sheelagh T. Carpen...
— In a previous paper [3], we proposed a new way to achieve visual servoing. Rather than minimizing the error between the position of two set of geometric features, we proposed t...