By shifting the burden of proofs to the user, a proof-carrying authorization (PCA) system can automatically enforce complex access control policies. Unfortunately, managing those p...
This paper presents the time domain and timefrequency domain analysis results of incipient events in single-phase distribution transformers. This analysis will aid in the developm...
Current workflow management systems (WFMSs) are only applicable in a reliable and secure manner, if the business process (BP) to be supported is wellstructured. As ad hoc deviatio...
We propose an automatic monitoring system which detects and tracks intruders, using a pan-tiltzoom camera. Detection is based on a background subtraction method which detects the ...
Abstract--The domain name system (DNS) is critical to Internet functionality. The availability of a domain name refers to its ability to be resolved correctly. We develop a model f...
Casey T. Deccio, Jeff Sedayao, Krishna Kant, Prasa...