Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
The Foundation Coalition and others have been working on the development of Concept Inventory (CI) assessment instruments patterned after the well-known Force Concept Inventory...
Global address space languages like UPC exhibit high performance and portability on a broad class of shared and distributed memory parallel architectures. The most scalable applic...
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
In this paper, we propose a fast and robust method for tracking a user’s hand and multiple fingertips; we then demonstrate gesture recognition based on measured fingertip traj...