Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
We describe a platform for context-aware computing which enables applications to follow mobile users as they move around a building. The platform is particularly suitable for rich...
Andy Harter, Andy Hopper, Pete Steggles, Andy Ward...
With the trend of globalization, enterprises require to extend their logistics scope from domestic to international, integrate logistics networks, and improve the agility and effi...
Charles V. Trappey, Amy J. C. Trappey, Gilbert Y. ...
In this paper, we introduce an analytical expression for the expected distortion of a single layer encoded video bit-stream. Based on the expected distortion model, we propose a d...