The proliferation of complex and fast-spreading intrusions not only requires advances in intrusion detection mechanisms but also demands development of sophisticated and automated...
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
— We propose a computationally efficient method based on nonlinear optimization to identify critical lines, failure of which can cause severe blackouts. Our method computes crit...
Agent based online auctions have not yet become popular because they are not trustable. One of the major concerns in agent based online auctions is the shilling behavior problem, w...
− Autostereoscopic display systems can provide users a natural 3-D visualization environment by projecting stereo video onto the user's eyes. Eye position localization is a ...
Chan-Hung Su, Yong-Sheng Chen, Yi-Ping Hung, Chu-S...