Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Abstract. Recommender systems face up to current information overload by selecting automatically items that match the personal preferences of each user. The so-called content-based...
Aircraft tracking has applications in guided landing, automatic scoring in aerobatics and target tracking for military. Radar based tracking is expensive, gives away the position ...
In the highly dynamic and unpredictable environment of MANETs, cross-layer design is receiving growing interest but lacks experimental validation tools. This paper presents XIAN (C...
Existing approaches to nonrigid structure from motion assume that the instantaneous 3D shape of a deforming object is a linear combination of basis shapes, which have to be estima...
Ijaz Akhter, Yaser Sheikh, Sohaib Khan, Takeo Kana...