Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
It is now common for video; real-time and collected, mobile and static, to be georeferenced and stored in large archives for users of expert systems to access and interact with. I...
This paper introduces the Perplexus hardware platform, a scalable computing substrate made of custom reconfigurable devices endowed with bio-inspired capabilities. This platform w...
Andres Upegui, Yann Thoma, Eduardo Sanchez, Andr&e...
Nowadays, video games propose rich scenarios with movementsbased game play, through the manipulation of dedicated devices. The motivation of this study is the elaboration of a com...