The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
This paper describes a new technique for passive ranging which is of special interest in areas such as covert nap-of-the-earth helicopter flight and spacecraft landing. This techn...
We present a novel method for state minimization of incompletely-specified finite state machines. Where classic methods simply minimize the number of states, ours directly addre...
Software architectures evolve as the result of numerous, interrelated design decisions. At any point in an architecture’s evolution, current decisions can critically affect alte...
Jason E. Robbins, David M. Hilbert, David F. Redmi...
This paper proposes to use relief-mapped conical frusta (cones cut by planes) to skin skeletal objects. Based on this representation, current programmable graphics hardware can pe...