Abstract. Even though there have been many research works on distributed deadlock detection and recovery mechanisms, the multi-cycle deadlock problems are not extensively studied y...
Most network anomaly detection research is based on packet header fields, while the payload is usually discarded. Preventing unknown attacks and Internet worms has led to a need f...
Abstract. In this paper, we present a system framework for event detection in pedestrian and tracking applications. The system is built upon a robust computer vision approach to de...
This paper presents a trinocular stereo algorithm that we have developed as part of an obstacle detection system that detects small obstacles at long range on the highway. We desc...
—This paper presents a methodology and a tool for automatic synthesis of highly efficient intrusion detection systems using a high-level, graph-based partitioning methodology and...