In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Althoughthereisalargebodyofresearchonthetimeoverheadofobject oriented programs, there is little work on memory overhead. This paper takes an empirical approach to the study of this...
Abstract. We demonstratehow the use of synchronizationprimitives and threading policies in distributed object middleware can lead to deadlocks. We identify that objectmiddleware on...
Abstract The sos formats ensuring that bisimilarity is a congruence often fail in the presence of structural axioms on the algebra of states. Dynamic bisimulation, introduced to ch...
This work presents a real time system for detection and tracking of facial features in video sequences. Such system may be used in visual communication applications, such as teleco...