The C-17 Airdrop Model provides the Air Force and Army test and evaluation community with the capability to (i) assess the risk of vortex encounters, and (ii) predict ground dispe...
T. Glenn Bailey, Jose C. Belano III, Philip S. Ber...
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...
In a future networked physical world, a myriad of smart sensors and actuators assess and control aspects of their environments and autonomously act in response to it. Examples ran...
We advocate a desktop virtual reality (VR) interface to a geographic information system (GIS). The navigational capability to explore large topographic scenes is a powerful metaph...
Renato Pajarola, Thomas Ohler, Peter Stucki, Korne...
New security architectures are difficult to prototype and test at the design stage. Fine-grained monitoring of the interactions between hardware, the operating system, and applica...
Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-...