Search
Now showing items 41-50 of 72
Wicked Problems and Gnarly Results: Reflecting on Design and Evaluation Methods for Idiosyncratic Personal Information Management Tasks
(2008-02-10)
This paper is a case study of an artifact design and evaluation process; it is a reflection on how right thinking about design methods may at times result in sub-optimal results. Our goal has been to assess our decision ...
Finding Bugs In Dynamic Web Applications
(2008-02-06)
Web script crashes and malformed dynamically-generated web pages are common errors, and they seriously impact usability of web applications. Currenttools for web-page validation cannot handle the dynamically-generatedpages ...
Exploiting Transport-Level Characteristics of Spam
(2008-02-15)
In the arms race to secure electronic mail users and servers fromunsolicited messages (spam), the most successful solutions employtechniques that are difficult for spammers to circumvent. Thisresearch investigates the ...
Learning Grammatical Models for Object Recognition
(2008-02-25)
Many object recognition systems are limited by their inability to share common parts or structure among related object classes. This capability is desirable because it allows information about parts and relationships in ...
Making Medical Records More Resilient
(2008-02-17)
Hurricane Katrina showed that the current methods for handling medicalrecords are minimally resilient to large scale disasters. This research presents a preliminary model for measuring the resilience of medical records ...
A Multi-Scale Generalization of the HoG and HMAX Image Descriptors for Object Detection
(2008-04-09)
Recently, several powerful image features have been proposed whichcan be described as spatial histograms of oriented energy. Forinstance, the HoG, HMAX C1, SIFT, and Shape Context feature allrepresent an input image using ...
Trajectory Analysis and Semantic Region Modeling Using A Nonparametric Bayesian Model
(2008-06-24)
We propose a novel nonparametric Bayesian model, Dual Hierarchical Dirichlet Processes (Dual-HDP), for trajectory analysis and semantic region modeling in surveillance settings, in an unsupervised way. In our approach, ...
ZigZag Decoding: Combating Hidden Terminals in Wireless Networks
(2008-04-08)
This paper presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11 retransmissions which, in the case of hidden terminals, cause successive collisions. Due to asynchrony, these collisions ...
Two-stage Optimization Approach to Robust Model Predictive Control with a Joint Chance Constraint
(2008-03-06)
When controlling dynamic systems such as mobile robots in uncertain environments, there is a trade off between risk and reward. For example, a race car can turn a corner faster by taking a more challenging path. This paper ...
Cognitive Security for Personal Devices
(2008-03-17)
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...