We introduce the notion of a data topology and the problem of topology search over databases. A data topology summarizes the set of all possible relationships that connect a given...
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
This paper presents the application of cognitive algorithm for a stream diffusion in home theatre “5+1 audio” surround applications. We develop a wavelet-based method to effic...
In this paper, we propose an approach to collaboratively track motion of a moving target in a wide area utilizing camera-equipped visual sensor networks, which are expected to pla...
Xiaoling Wu, Hoon Heo, Riaz Ahmed Shaikh, Jinsung ...
Polyphase IIR structures are known to be very attractive for very high performance filters that can be designed using very few coefficients. This combined with their reduced sensi...