Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
I discuss algorithms based on bistellar flips for inserting and deleting constraining (d − 1)-facets in d-dimensional constrained Delaunay triangulations (CDTs) and weighted CD...
This paper presents Maya, a multi-paradigm, scalable and extensible network modeling framework for emulating distributed applications. A novel three-tier architecture is proposed ...
Junlan Zhou, Zhengrong Ji, Mineo Takai, Rajive Bag...
Video surveillance systems seek to automatically identify events of interest in a variety of situations. Extracting a moving object from background is the most important step of t...
Adapting graphical user interface (GUI) to meet higher level of usability for users is one of the most interesting questions of today’s mobile computation. Users should have GUI ...