The performance of an intrusion detector depends on several factors, like its internal architecture and the algorithms it uses. Thus, distinct detectors can behave distinctly when ...
Navy personnel use the REMUS unmanned underwater vehicle to search for submerged objects. Navigation inaccuracies lead to errors in predicting the location of objects and thus inc...
Timothy E. Allen, Arnold H. Buss, Susan M. Sanchez
This paper investigates the practical issues in applying network tomography to monitor failures. We outline an approach for selecting paths to monitor, detecting and confirming th...
The Web Services-Event-Condition-Action (WSECA) framework is designed to enable the heterogeneous communication devices in Ubiquitous Computing Environments to achieve inter-opera...
Animation authoring involves an author's interaction with a scene, resulting in varying scene complexity for a given animation sequence. In such a varying environment, detecti...
Parag Agarwal, Srinivas Rajagopalan, B. Prabhakara...