In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
Abstract. We propose a new scheme for novelty detection in image sequences capable of handling non-stationary background scenarious, such as waving trees, rain and snow. Novelty de...
Fredrik Kahl, Richard I. Hartley, Volker Hilsenste...
We describe a new method for detecting features on a marked RoboCup field. We implemented the framework for robots with omnidirectional vision, but the method can be easily adapte...
Felix von Hundelshausen, Michael Schreiber, Ra&uac...
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...