Wireless networks are an ideal environment for mobile agents, because their mobility allows them to move across an unreliable link to reside on a wired host, next to or closer to ...
David Kotz, Guofei Jiang, Robert S. Gray, George C...
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
Schneider's work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only wit...
Face detection is a key problem in human-computer interaction. In this paper, we present an algorithm for rotation invariant face detection in color images of cluttered scenes. It ...
This paper describes a versatile, robust, and parametric ball animation model that can be used in many types of interactive Virtual Reality (VR) environments. The generic model is ...
Hansrudi Noser, Christian Stern, Peter Stucki, Dan...