This paper presents an extension to the ePresence Interactive Media webcasting infrastructure to support real-time voice and video conferencing for a few attendees while concurrent...
Ronald Baecker, Jeremy P. Birnholtz, Rhys Causey, ...
The association of perception and action is key to learning by observation in general, and to programlevel task imitation in particular. The question is how to structure this info...
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
This study aims at identifying when an event written in text occurs. In particular, we classify a sentence for an event into four time-slots; morning, daytime, evening, and night....
This study introduces a new analytic queuing model, the N-Burst/G/1 model with heavy-tailed service-time distribution, which captures many of the issues that affect Web servers as...