– We describe a monocular robot vision system which accomplishes accurate 3-DOF dead-reckoning, closedloop motion control, and precipice and obstacle detection, all in dynamic en...
Jason Campbell, Rahul Sukthankar, Illah R. Nourbak...
One of the growing problems faced by network administrators is the abuse of computing resources by authorized and unauthorized personnel. The nature of abuse may vary from using u...
Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. ...
In this paper, we present the results of the Acoustic Event Detection (AED) and Classification (AEC) evaluations carried out in February 2006 by the three participant partners from...
Andrey Temko, Robert Malkin, Christian Zieger, Dus...
Abstract. We demonstratehow the use of synchronizationprimitives and threading policies in distributed object middleware can lead to deadlocks. We identify that objectmiddleware on...
- Network Intrusion Detection Systems (NIDS) capture large amounts of data that is difficult or impractical to report and analyze directly from the capture device. It is also commo...