We have developed a framework for Web-based GIS/database (WebGD) applications
that allow users to insert, query, and delete data with map interfaces displayed by Web
browsers. The framework uses such open source software packages as Minnesota
MapServer, PostGIS, and PostgreSQL. With this framework, we can create the map
interface of...
Controlling a virtual character with a pen input device is difficult. Pen input
devices require freeform gestures and users are not confined to particular mapping of a
key or a button that is exactly repeatable. This is a problem since an intuitive motion
gesture for one user might not be...
Spatial Supervised Learning seeks to learn how to assign a label to each pixel in a spatial grid
such as the pixels of remote-sensed images. The standard approach is to treat each grid cell
separately and to use only the measured features of the grid cell to determine the assigned...
In some practical systems, most of the errors are of 1 → 0 type and 0 → 1
errors occur very rarely. In this thesis, first, the capacity of the asymmetric
channel is derived. The capacity of the binary symmetric channel (BSC) and the
Z-channel can be derived from this...
Current database systems apply access control mostly on tables and columns.
However, many applications require access control on individual rows in database
tables. Therefore, we have implemented a row-based access control mechanism. In
our model for access control, object groups, in addition to user groups, are used to
reduce the...
Successful software systems evolve over their lifetimes through the cumulative changes made by software maintainers. As software evolves, the problems resulting from software change worsen, exacerbated by increased system size and complexity, lack of program understanding, amount of effort required to make changes, and number of personnel involved. Experience shows...
"‘Biometrics is at the forefront in our agenda for homeland security,’ declared Asa Hutchinson, the Department of Homeland Security's undersecretary for border and transportation security, at the 2004 Biometric Consortium Conference” [11].
Flashy retinal scanning and voice activated computers were once considered technologies for science fiction movies and novels. Nowadays,...
"SAML Edit® is a PC-based tool for creation and manipulation of SAML Assertion text files (as defined by OASIS). The tool allows its user to modify the data/information contained in the underlying file. As security information between entities is exchanged using such SAML Assertion text files, the ability to manipulate...
Graph-based approaches for sequencing motion capture data have produced some of the most realistic and controllable character motion to date. Most previous graph-based approaches have employed a run-time global search to find paths through the motion graph that meet user-defined constraints such as a desired locomotion path. Such searches do...
Professional software developers do not test code adequately, even though testing tools are widely available. Until developers realize the deficiencies in their tests, inadequate testing of software seems likely to remain a major problem. To support developers writing tests, industry and researchers have proposed systems that visualize “testedness” for end-user...