Face segmentation has been used in many different applications, such as face tracking, video surveillance in security control system and human computer interface. In this paper we...
Rudy Adipranata, Eddy, Cherry G. Ballangan, Ronald...
— We present and evaluate the design of a new and comprehensive solution for automated worm detection and immunization. The system engages a peer-to-peer network of untrusted mac...
Ubiquitous communication will be one of the paradigms for the next decades. The use of the Internet in such applications demands for a highly reliable and secure system, especiall...
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...