All Stories

  1. OpenISS depth camera as a near-realtime broadcast service for performing arts and beyond
  2. Agile Forward-Reverse Requirements Elicitation as a Creative Design Process: A Case Study of Illimitable Space System v2
  3. Constraint Adaptation in Web Service Composition
  4. Predictive Failure Recovery in Constraint-aware Web Service Composition
  5. Hands-on
  6. Managing Data and Artifacts between Software Engineers and Artists
  7. Demand-Driven SOA Simulation Platform Based on GIPSY for Context-Based Brokerage
  8. Hands-on
  9. ISSv3
  10. Real-time collection and analysis of 3-Kinect v2 skeleton data in a single application
  11. Efficient Constraint Verification in Service Composition Design and Execution (Short Paper)
  12. HCI in performance arts and the case of Illimitable Space System's multimodal interaction and visualization
  13. Rapid interactive real-time application prototyping for media arts and stage performance
  14. A case study of the Illimitable Space System v2 and projection mapping
  15. Course: Rapid advanced multimodal multi-device interactive application prototyping with Max/Jitter, processing, and OpenGL
  16. Applications of the Illimitable Space System in the context of media technology and on-stage performance: A collaborative interdisciplinary experience
  17. Demo: Towards historical sightseeing with an augmented reality interactive documentary app
  18. Demo: Spatial UI experience and projection mapping on stage with ISSv2
  19. Network malware classification comparison using DPI and flow packet headers
  20. MARFCAT: Fast code analysis for defects and vulnerabilities
  21. Automating MAC Spoofer Evidence Gathering and Encoding for Investigations
  22. On a non-web-based multimodal interactive documentary production
  23. Illimitable Space System as a multimodal interactive artists' toolbox for real-time performance
  24. Demo hour
  25. Innovative medical applications and beyond of 3D techniques in a responsive virtual reality lab
  26. A brief technical note on haptic jellyfish with falcon and openGL
  27. The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities
  28. Towards Fingerprinting Malicious Traffic
  29. An interactive graph-based automation assistant
  30. Developing Autonomic Properties for Distributed Pattern-Recognition Systems with ASSL
  31. Unifying and refactoring DMF to support concurrent Jini and JMS DMS in GIPSY
  32. Reasoning About a Simulated Printer Case Investigation with Forensic Lucid
  33. On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY
  34. Multifaceted faculty network design and management
  35. Combining and Comparing Multiple Algorithms for Better Learning and Classification: A Case Study of MARF
  36. A Type System for Higher-Order Intensional Logic Support for Variable Bindings in Hybrid Intensional-Imperative Programs in GIPSY
  37. Object-Oriented Intensional Programming: Intensional Java/Lucid Classes
  38. Writer Identification Using Inexpensive Signal Processing Techniques
  39. Teaching Physical Based Animation via OpenGL Slides
  40. Evolution of MARF and its NLP framework
  41. Advances in the Design and Implementation of a Multi-tier Architecture in the GIPSY Environment with Java
  42. Towards a self-forensics property in the ASSL toolset
  43. Using the General Intensional Programming System (GIPSY) for Evaluation of Higher-Order Intensional Logic (HOIL) Expressions
  44. Cryptolysis: A Framework for Verification of Optimization Heuristics for the Automated Cryptanalysis of Classical Ciphers and Natural Language Word Segmentation
  45. Towards Autonomic Specification of Distributed MARF with ASSL: Self-healing
  46. Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence
  47. An OpenGL-based Interface to 3D PowerPoint-like Presentations of OpenGL Projects
  48. Encoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions
  49. Distributed Modular Audio Recognition Framework (DMARF) and its Applications Over Web Services
  50. The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement
  51. The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement
  52. Simple Dynamic Key Management in SQL Randomization
  53. Autonomic specification of self-protection for distributed MARF with ASSL
  54. An ASSL-generated architecture for autonomic systems
  55. Self-Forensics Through Case Studies of Small-to-Medium Software Systems
  56. A type system for hybrid intensional-imperative programming support in GIPSY
  57. Designing an interactive OpenGL slide-based presentation of the softbody simulation system for teaching and learning of computer graphics techniques
  58. A stereoscopic OpenGL-based interactive plug-in framework for Maya and beyond
  59. Towards Security Hardening of Scientific Demand-Driven and Pipelined Distributed Computing Systems
  60. Design and Implementation of Context Calculus in the GIPSY Environment
  61. Towards Syntax and Semantics of Hierarchical Contexts in Multimedia Processing Applications Using MARFL
  62. Study of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF
  63. Introducing MARF: a Modular Audio Recognition Framework and its Applications for Scientific and Software Engineering Research
  64. Toward Policy-Based Dynamic Context-Aware Adaptation Architecture for Web Service Composition
  65. Toward Automated MAC Spoofer Investigations
  66. Context-Aware Cloud Service Brokerage
  67. Choosing Best Algorithm Combinations for Speech Processing Tasks in Machine Learning Using MARF
  68. Taxonomy of Linux Kernel Vulnerability Solutions