Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- invited-talkAugust 2023
Avatar: The Way of Hair, Cloth, and Coupled Simulation
- Xiao Zhai,
- Eston Schweickart,
- Nikolay Ilinov,
- Joel Wretborn,
- Alexey Stomakhin,
- John Homer,
- Jefri Haryono,
- Julian Butler
SIGGRAPH '23: ACM SIGGRAPH 2023 TalksArticle No.: 61, Pages 1–2https://doi.org/10.1145/3587421.3595408This talk presents CreLoki, an extension to the multi-physics framework Loki. It enables unified creatures physics, such as hair and cloth in wet, dry, and underwater contexts with predefined coupling modes. By maintaining a solver setup configuration ...
- research-articleMay 2021
On Designing Programming Error Messages for Novices: Readability and its Constituent Factors
- Paul Denny,
- James Prather,
- Brett A. Becker,
- Catherine Mooney,
- John Homer,
- Zachary C Albrecht,
- Garrett B. Powell
CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing SystemsArticle No.: 55, Pages 1–15https://doi.org/10.1145/3411764.3445696Programming error messages play an important role in learning to program. The cycle of program input and error message response completes a loop between the programmer and the compiler/interpreter and is a fundamental interaction between human and ...
- research-articleAugust 2018
Metacognitive Difficulties Faced by Novice Programmers in Automated Assessment Tools
ICER '18: Proceedings of the 2018 ACM Conference on International Computing Education ResearchPages 41–50https://doi.org/10.1145/3230977.3230981Most novice programmers are not explicitly aware of the problem-solving process used to approach programming problems and cannot articulate to an instructor where they are in that process. Many are now arguing that this skill, called metacognitive ...
- research-articleAugust 2017
On Novices' Interaction with Compiler Error Messages: A Human Factors Approach
- James Prather,
- Raymond Pettit,
- Kayla Holcomb McMurry,
- Alani Peters,
- John Homer,
- Nevan Simone,
- Maxine Cohen
ICER '17: Proceedings of the 2017 ACM Conference on International Computing Education ResearchPages 74–82https://doi.org/10.1145/3105726.3106169The difficulty in understanding compiler error messages can be a major impediment to novice student learning. To alleviate this issue, multiple researchers have run experiments enhancing compiler error messages in automated assessment tools for ...
- research-articleMarch 2017
Do Enhanced Compiler Error Messages Help Students?: Results Inconclusive.
SIGCSE '17: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science EducationPages 465–470https://doi.org/10.1145/3017680.3017768One common frustration students face when first learning to program in a compiled language is the difficulty in interpreting the compiler error messages they receive. Attempts to improve error messages have produced differing results. Two recently ...
-
- research-articleNovember 2016
Augmenting attack graphs to represent data link and network layer vulnerabilities
MILCOM 2016 - 2016 IEEE Military Communications ConferencePages 1010–1015https://doi.org/10.1109/MILCOM.2016.7795462Attack graphs enable system stakeholders to understand the stepping stones or exploitation procedures that an adversary could potentially execute to impact the confidentiality, integrity, and availability of a network system. These graphs are used to ...
- research-articleFebruary 2015
An Empirical Study of Iterative Improvement in Programming Assignments
SIGCSE '15: Proceedings of the 46th ACM Technical Symposium on Computer Science EducationPages 410–415https://doi.org/10.1145/2676723.2677279As automated tools for grading programming assignments become more widely used, it is imperative that we better understand how students are utilizing them. Other researchers have provided helpful data on the role automated assessment tools (AATs) have ...
- articleJuly 2013
Aggregating vulnerability metrics in enterprise networks using attack graphs
Quantifying security risk is an important and yet difficult task in enterprise network security management. While metrics exist for individual software vulnerabilities, there is currently no standard way of aggregating such metrics. We present a model ...
- ArticleJuly 2011
Effective network vulnerability assessment through model abstraction
A significant challenge in evaluating network security stems from the scale of modern enterprise networks and the vast number of vulnerabilities regularly found in software applications. A common technique to deal with this complexity is attack graphs, ...
- articleMay 2010
A blind detection-guided approach for normalised multi-modulus crosstalk estimator in sparse multi-user DSL channels
Digital Signal Processing (DISP), Volume 20, Issue 3Pages 653–663https://doi.org/10.1016/j.dsp.2009.09.006In high-speed digital subscriber lines (DSL), far-end crosstalk is the main limiting factor on data rates. However, most of the crosstalk is due to the neighbouring twisted pairs in the binder. Therefore, the crosstalk channel matrix is sparse. Using ...
- ArticleJuly 2009
Node Localisation in Mobile Ad Hoc Networks Using Double Time Difference of Arrival
UIC-ATC '09: Proceedings of the 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted ComputingPages 389–394https://doi.org/10.1109/UIC-ATC.2009.80The double time difference of arrival (DTDOA)approach applying in the mobile ad hoc network can effective avoid the synchronization problem. This paper investigates the performance of techniques for DTDOA node localisation in Mobile ad hoc network by ...
- research-articleApril 2009
Sat-solving approaches to context-aware enterprise network security management
IEEE Journal on Selected Areas in Communications (JSAC), Volume 27, Issue 3Pages 315–322https://doi.org/10.1109/JSAC.2009.090407Enterprise network security management is a complex task of balancing security and usability, with trade-offs often necessary between the two. Past work has provided ways to identify intricate attack paths due to misconfiguration and vulnerabilities in ...
- doctoral_thesisJanuary 2009
A comprehensive approach to enterprise network security management
Enterprise network security management is a vitally important task, more so now than ever before. Networks grow ever larger and more complex, and corporations, universities, government agencies, etc . rely heavily on the availability of these networks. ...
- ArticleSeptember 2008
Improving Attack Graph Visualization through Data Reduction and Attack Grouping
VizSec '08: Proceedings of the 5th international workshop on Visualization for Computer SecurityPages 68–79https://doi.org/10.1007/978-3-540-85933-8_7Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find ...
- articleDecember 2006
Detection-Guided Fast Affine Projection Channel Estimator for Speech Applications
EURASIP Journal on Audio, Speech, and Music Processing (EJASMP), Volume 2007, Issue 1Article No.: 141, Pages 1–13In various adaptive estimation applications, such as acoustic echo cancellation within teleconferencing systems, the input signal is a highly correlated speech. This, in general, leads to extremely slow convergence of the NLMS adaptive FIR estimator. As ...
- articleJune 2006
An implementation of nonlinear multiuser detection in Rayleigh fading channel
EURASIP Journal on Wireless Communications and Networking (JWCN), Volume 2006, Issue 3Article No.: 3, Pages 1–9A blind nonlinear interference cancellation receiver for code-division multiple-access- (CDMA-) based communication systems operating over Rayleigh flat-fading channels is proposed. The receiver which assumes knowledge of the signature waveforms of all ...
- ArticleNovember 2002
Hop selection in peer-to-peer WPAN networks
ICCS '02: Proceedings of the The 8th International Conference on Communication Systems - Volume 02Pages 870–872Currently, wireless technology is revolutionizing the way we share information and communicate. The demands for mobility have made wireless technology the primary source for voice communication. Code-division multiple-access (CDMA) is a very popular ...
- research-articleOctober 1998
LMS estimation via structural detection
IEEE Transactions on Signal Processing (TSP), Volume 46, Issue 10Pages 2651–2663https://doi.org/10.1109/78.720368We consider the LMS estimation of a channel that may be well approximated by an FIR model with only a few nonzero tap coefficients within a given delay horizon or tap length n. When the number of nonzero tap coefficients m is small compared with the ...
- research-articleOctober 1998
Quantifying the effects of dimension on the convergence rate of the LMS adaptive FIR estimator
IEEE Transactions on Signal Processing (TSP), Volume 46, Issue 10Pages 2611–2615https://doi.org/10.1109/78.720364The convergence rate of an LMS adaptive FIR filter to an unknown stationary channel may be influenced by the filter parameter dimension as well as by the input signal's characteristics. This dimension influence may be of importance in applications, such ...