Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
Recent theoretical results in buffer sizing research suggest that core Internet routers can achieve high link utilization, if they are capable of storing only a handful of packets...
Neda Beheshti, Jad Naous, Yashar Ganjali, Nick McK...
Disasters can cause extraordinary service demand by the public, while concurrently causing outages that reduce network capacity to serve the surging demand. It is imperative that ...
David A. Garbin, Patrick V. McGregor, Denise M. Be...
In this paper, we present a learning procedure called probabilistic boosting network (PBN) for joint real-time object detection and pose estimation. Grounded on the law of total p...
Jingdan Zhang, Shaohua Kevin Zhou, Leonard McMilla...
This paper describes a discriminatively trained, multiscale, deformable part model for object detection. Our system achieves a two-fold improvement in average precision over the b...
Pedro F. Felzenszwalb, David A. McAllester, Deva R...