When building enterprise applications that need to be accessed through a variety of client devices, developers usually strive to implement most of the business logic device-indepen...
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
Abstract— Today’s mobile, wireless, and ad-hoc communications often exhibit extreme characteristics challenging assumptions underlying the traditional way of end-toend communic...
The current model of time in multimedia frameworks poses particular problems when designing multimedia systems with timebased interaction. We propose to expand and extend an exist...
We present an approach to vision-based person detection in robotic applications that integrates top down template matching with bottom up classifiers. We detect components of the ...