The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
The ability to provide assistance for a student at the appropriate level is invaluable in the learning process. Not only does it aid the student’s learning process but also prev...
The representation and modelling of regions is an important topic in computer vision. In this paper, we represent a region via a level set of a ‘phase field’ function. The fu...
Multi-stream hidden Markov models (HMMs) have recently been very successful in audio-visual speech recognition, where the audio and visual streams are fused at the final decision...
Testing plays an important role in the maintenance of Component Based Software Development. Test adequacy for component testing is one of the hardest issues for component testing....
Ying Jiang, Shan-Shan Hou, Jinhui Shan, Lu Zhang, ...