The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
We present the design, implementation, and evaluation of PROMISE, a novel peer-to-peer media streaming system encompassing the key functions of peer lookup, peer-based aggregated ...
Monitoring activities using video data is an important surveillance problem. A special scenario is to learn the pattern of normal activities and detect abnormal events from a very...
Namrata Vaswani, Amit K. Roy Chowdhury, Rama Chell...
Background: Gene expression microarray and other multiplex data hold promise for addressing the challenges of cellular complexity, refined diagnoses and the discovery of well-targ...
Abdallah Sayyed-Ahmad, Kagan Tuncay, Peter J. Orto...
Interface design for the home requires a realistic understanding of the complexity and richness of the human activities that go on there; it is our goal to develop tools that enab...
Jennifer Beaudin, Stephen S. Intille, Emmanuel Mun...