Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
— The use of design patterns usually changes the approach of software design and makes software development relatively easy. This paper extends work on a forensic model for Logic...
The RiTa Toolkit for Computation Literature is a suite of open-source components, tutorials, and examples, providing support for a range of tasks related to the practice of creati...
Object Segmentation is an important step in object reconstruction from point cloud data of complex urban scenes and in applications to virtual environment. This paper focuses on s...
Xiaojuan Ning, Xiaopeng Zhang, Yinghui Wang, Marc ...
Abstract—This paper presents a hierarchical control architecture that enables cooperative surveillance by a heterogeneous aerial robot network comprised of mothership unmanned ai...