In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically exhibit patterns, they are exploitable by brute-force ...
: Usability evaluation techniques such as user-observations, cognitive walkthroughs, or heuristic evaluations can be applied to evaluate the usability of multimedia interfaces of c...
The relative depth of objects causes small shifts in the left and right retinal positions of these objects, called binocular disparity. Here, we describe a neuromorphic implementa...
Scheduling, routing, and layout tasks are examples of hard operations-research problems that have broad application in industry. Typical algorithms for these problems combine some...
David Anderson, Emily Anderson, Neal Lesh, Joe Mar...
Self-organizing models develop realistic cortical structures when given approximations of the visual environment as input, and are an effective way to model the development of fac...