A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
—In this paper, we introduce a new approach to fault detection for robot manipulators. The technique, which is based on the isolation of fault signatures via filtered torque pred...
Warren E. Dixon, Ian D. Walker, Darren M. Dawson, ...
Code duplication is considered as bad practice that complicates the maintenance and evolution of software. Detecting duplicated code is a difficult task because of the large amoun...
We introduce a stochastic model to characterize the online computational process of an object recognition system based on a hierarchy of classifiers. The model is a graphical netwo...
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). Current software-based NIDS are too compute intensive and can not ...