With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
—Recently it has been recognized that robust motion planners should take into account the varying performance of localization sensors across the configuration space. Although a n...
Current HTTP servers process requests using a first come first serve queuing policy. What this implies is that the web server must process each request as it arrives. The result is...
We consider the problem of automatically generating viewpoint motions for a virtual camera tracking a moving target. Given the target's trajectory, we plan the motion of a ca...
Image processing applications tend to access their data non-sequentially and reuse that data infrequently. As a result, they tend to perform poorly on conventional memory systems ...
Lixin Zhang, John B. Carter, Wilson C. Hsieh, Sall...