In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Software reuse technologies have been a driving force in significantly reducing both the time and cost of software specification, development, maintenance and evolution. However, t...
A number of studies have explored issues of interruption and availability in workplace environments, but few have examined how attitudes toward availability play out in home life....
Kristine S. Nagel, James M. Hudson, Gregory D. Abo...
While most current approaches for sports video analysis are based on broadcast video, in this paper, we present a novel approach for highlight detection and automatic replay gener...
Jinjun Wang, Changsheng Xu, Chng Eng Siong, Kongwa...
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...