We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
Monitoring the resources of distributed systems is essential to the successful deployment and execution of grid applications, particularly when such applications have welldefined...
Sandip Agarwala, Christian Poellabauer, Jiantao Ko...
Neural networks are a powerful technology for classification of visual inputs arising from documents. However, there is a confusing plethora of different neural network methods th...
Abstract— Recently, we have implemented a computervision based horizon-tracking algorithm for flight stability and autonomy in Micro Air Vehicles (MAVs) [1]. Occasionally, this ...
Sinisa Todorovic, Michael C. Nechyba, Peter G. Ifj...
— Service discovery is an integral part of the ad hoc networking to achieve stand-alone and self-configurable communication networks. In this paper, we discuss possible service ...