Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Component frameworks, including those that support the Common Component Architecture (CCA), represent a promising approach to addressing this challenge, one that is being realized...
Madhusudhan Govindaraju, Michael J. Lewis, Kenneth...
There may be limited resources for local government website designers to devote to innovative design. This study investigated current technology use by local government (Town of B...
Hyung Nam Kim, Andrea L. Kavanaugh, Tonya L. Smith...
In this paper we present and discuss the system we developed for the search task of the TRECVID 2002, and its evaluation in an interactive search task. To do this we will look at ...
Georgina Gaughan, Alan F. Smeaton, Cathal Gurrin, ...
Abstract: The paper describes the humanoid robot \H6", which was designed to serve as a platform for experimental research on the development of advanced humanoid-type robots....
Satoshi Kagami, Koichi Nishiwaki, James J. Kuffner...