Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
In this paper it is shown that, if a time-varying uncertain system is robustly completely detectable, then there exists an estimator for this system, i.e. the state vector of the ...
We have developed an approach for whole-house gross movement and room transition detection through sensing at only one point in the home. We consider this system to be one member o...
Shwetak N. Patel, Matthew S. Reynolds, Gregory D. ...
Recognizing classes of objects from their shape is an unsolved problem in machine vision that entails the ability of a computer system to represent and generalize complex geometric...
Salvador Ruiz-Correa, Linda G. Shapiro, Marina Mei...