Differential, transmitted reference (TR) and energy detection (ED) based ultra-wideband impulse radios (UWBIR) can collect the rich multipath energy offered by UWB channels with a ...
Shahrokh Farahmand, Xiliang Luo, Georgios B. Giann...
: This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of acces...
—Many graph visualization systems use graph hierarchies to organize a large input graph into logical components. These approaches detect features globally in the data and place t...
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Abstract. An appropriate image representation induces some good image treatment algorithms. Hypergraph theory is a theory of finite combinatorial sets, modeling a lot of problems ...