Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
International Conference on Image Processing (ICIP 97), vol. 1, pp. 444-447, Santa Barbara, October 1997. In this paper a model-based multi-view image generation system for video ...
Chun-Jen Tsai, Aggelos K. Katsaggelos, Peter Eiser...
Abstract. We have argued previously that the e ectiveness of a veri cation system derives not only from the power of its individual features for expression and deduction, but from ...
When applying Dynamic Power Management (DPM) technique to pervasively deployed embedded systems, the technique needs to be very efficient so that it is feasible to implement the t...
The use of viewpoints has long been proposed as a technique to structure evolving requirements models. In theory, viewpoints should provide better stakeholder traceability, and th...
Steve M. Easterbrook, Eric S. K. Yu, Jorge Aranda,...