—Flow correlation algorithms compare flows to determine similarity, and are especially useful and well studied for detecting flow chains through “stepping stone” hosts. Most ...
W. Timothy Strayer, Christine E. Jones, Beverly Sc...
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Operators of 3G data networks need to distinguish the performance of each geographic area in their 3G networks to detect and resolve local network problems. This is because the qu...
Our purpose is to provide an augmented reality system for Radio-Frequency guidance that could superimpose a 3D model of the liver, its vessels and tumors (reconstructed from CT ima...
Controlling the movements of mobile robots, including driving the robot through the world and panning the robot’s cameras, typically requires many physical joysticks, buttons, a...
Mark Micire, Munjal Desai, Jill L. Drury, Eric McC...