Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
In this paper, we describe a system that can carry4 out simultaneous localization and mapping (SLAM) in large in-5 door and outdoor environments using a stereo pair moving with 66 ...
Abstract. In the last years, techniques for activity recognition have attracted increasing attention. Among many applications, a special interest is in the pervasive e-Health domai...
- SuperMedia provides human operators rich environmental information, thus providing telepresence and enhances efficiency of operation. However, coupling human with the remote envi...
We propose a natural generalisation of asynchronous bounded delay (ABD) network models. The commonly used ABD models assume a known bound on message delay. This assumption is ofte...