Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
2 Detecting moving objects When we use a PTZ camera and background subtraction to detect moving objects, we must synchronize the PTZ of the camera and the PTZ of the background ima...
We consider the problem of detecting targets behind walls using radar imaging technology. An image-domain based detection technique is proposed that allows to adapt to specific t...
Christian Debes, Abdelhak M. Zoubir, Moeness G. Am...
Based on our field studies and consultations with field experts, we identified three main problems that are of key importance to online web personalization and customer relationsh...
—A sudden delay spike or reordering in the network can cause TCP to experience a loss event. Since loss is interpreted as a sign of congestion in TCP, this causes the protocol to...