This paper presents a novel classification strategy for 3D objects. Our technique is based on using a Global Geodesic Function to intrinsically describe the surface ofan object. T...
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
A course on pervasive computing should be structured around key functions throughout a systems development process to cover common underlying concerns throughout science and engin...
Governments have developed policies and strategies which are designed to assist SMEs to become eenabled. It is not clear what impact these strategies have on SMEs. There is some e...
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...