Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly ...
Skeleton is a lower dimensional shape description of an object. The requirements of a skeleton differ with applications. For example, object recognition requires skeletons with pr...
Intensive computations required for sensing and processing perceptual information can impose significant burdens on personal computer systems. We explore several policies for sel...
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Requirements engineering (RE) is concerned with the elicitation of the goals to be achieved by the system envisioned, the operationalization of such goals into specifications of se...