Analyzing and controlling large distributed services under a wide range of conditions is difficult. Yet these capabilities are essential to a number of important development and o...
David L. Oppenheimer, Vitaliy Vatkovskiy, Hakim We...
A new paradigm for online EH regeneration using Genetic Algorithms (GAs) called Competitive Runtime Reconfiguration (CRR) is developed where performance is assessed based upon a b...
Statistical background modelling and subtraction has proved to be a popular and effective class of algorithms for segmenting independently moving foreground objects out from a sta...
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Bomb disposal manned missions are inherently safetycritical. Wireless Sensor Network (WSN) technology potentially offers an opportunity to increase the safety of the operatives in...
John Kemp, Elena I. Gaura, James Brusey, C. Dougla...