Over half of California’s water supply comes from high elevations in the snowmelt-dominated Sierra Nevada. Natural climate fluctuations, global warming, and the growing needs of ...
Jessica D. Lundquist, Daniel R. Cayan, Michael D. ...
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Several recently proposed infrastructures permit client applications to interact with distributed network-accessible services by simply ”plugging in” into a substrate that pro...
Anca-Andreea Ivan, Josh Harman, Michael Allen, Vij...
Abstract—Many applications require continuous monitoring of a moving target by a controllable vision system. Although the goal of tracking objects is not new, traditional techniq...