Pervasive societal dependency on large-scale, unbounded network systems, the substantial risks of such dependency, and the growing sophistication of system intruders, have focused...
Richard C. Linger, Nancy R. Mead, Howard F. Lipson
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
The coordination paradigm has been used extensively as a mechanism for software composition and integration. However, relatively little work has been done for the cases where the ...
Theophilos A. Limniotes, Costas Mourlas, George A....
Inspired by the Defense Advanced Research Projects Agency's (DARPA) recent successes in speech recognition, we introduce a new task for sign language recognition research: a ...
R. Martin McGuire, Jose L. Hernandez-Rebollar, Tha...
There are many challenges in devising solutions for online content processing of live networked multimedia sessions. These include the computational complexity of feature extracti...
Viktor S. Wold Eide, Frank Eliassen, Olav Lysne, O...