We present in this article a precise security model for data confidentiality in the framework of ASP (Asynchronous Sequential Processes). ASP is based on active objects, asynchro...
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
Skin detection is an important preliminary process in human motion analysis. It is commonly performed in three steps: transforming the pixel color to a non-RGB colorspace, droppin...
Sriram Jayaram, Stephen Schmugge, Min C. Shin, Leo...
DePauw University is a small, liberal arts institution with 2200 undergraduate residential students and 222 faculty members, located in Greencastle, Indiana. The challenges of sup...
Lynda S. LaRoche, Julianne M. Miranda, Angela P. S...
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...