In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
The changing competitive landscape has brought new forces to bear on the manner in which new products are developed. These forces have put the creation and dissemination of knowle...
We present a generative model and stochastic filtering algorithm for simultaneous tracking of 3D position and orientation, non-rigid motion, object texture, and background texture...
Tim K. Marks, John R. Hershey, J. Cooper Roddey, J...
IEEE 802.11, the standard of wireless local area networks (WLANs), allows the coexistence of asynchronous and time-bounded traffic using the distributed coordination function (DCF)...
Air traffic flow management (TFM) is a set of processes and procedures which seek to balance the demand for airspace resources with the capacity of these resources. Examples of re...
Lynne Fellman, James S. DeArmon, Kelly A. Connolly