Throughout Europe, Northern Africa, and the Near East, hundreds of Roman ruins lie scattered about. Many Roman aqueducts, bridges, roads, and even buildings remain standing over two thousand years after their construction, as functional as the day they were built. In the modern United States, however, many public works projects...
In this work, I examine the problem of understanding American football in video. In particular, I present several mid-level computer vision algorithms that each accomplish a different sub-task within a larger system for annotating, interpreting, and analyzing collections of American football video. The analysis of football video is useful in...
There is a growing interest in bringing online and streaming content to the television. Gaming platforms such as the PS3, Xbox 360 and Wii are at the center of this digital convergence; platforms for accessing new media services. This presents a number of interface challenges, as controllers designed for gaming...
Spreadsheets are a widely used end-user programming tool. Field audits have found that 80-90% of spreadsheets created by end users contain textual and formula errors in spreadsheets. Such errors may have severe negative consequences for users in terms of productivity, credibility, or profits. To solve the problem of spreadsheet errors,...
Networks of distributed, remote sensors are providing ecological scientists with a view of our environment that is unprecedented in detail. However, these networks are subject to harsh conditions, which lead to malfunctions in individual sensors and failures in network communications. This behavior manifests as corrupt or missing measurements in the...
Researchers/engineers in the field of software testing have valued coverage as a testing metric for decades now. There have been various empirical results that have shown that as coverage increases the ability of the test program to detect a fault also increases. As a result numerous coverage techniques have been...
This project explores a security framework, called the Persona Concept, aimed at giving the user greater control over their private data in cyberspace, in particular, their electronic credentials. The background for the Persona Concept, along with the requirements identified can be found in three (3) technical publications produced by Kal...
This project addresses the problems of manually placing facial landmarks on a portrait and finding a fast way to warp the annotated image of a face. While there are many approaches to automatically find facial landmarks, most of them provide insufficient results in uncontrolled environments. Thus I introduce a method...
Buses can be impractical for those who must adhere to a strict schedule or depend on them for emergencies. While variations from the official bus schedule are understandable and largely unavoidable, a lack of communication discourages adoption at a rate disproportionate with their actual likelihood. Even if a bus is...
Programmers often have to choose components online for reuse based on software quality. To help with this choice, most component repositories (SourceForge, CodeProject, etc.) provide information such as user ratings and reviews of components. However, the reusability of components is not immediately obvious from
this material. To make things worse,...