Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Cloud computing offers new approaches for scientific computing that leverage the major commercial hardware and software investment in this area. Closely coupled applications are s...
Large-scale multiplayer online games require considerable investment in hosting infrastructures. However, the difficulty of predicting the success of a new title makes investing ...
Consider a set of sensors that wish to consent on the message broadcasted by a multi-antenna transmitter in the presence of white-noise jamming. The jammer’s interference introd...
Shahrokh Farahmand, Alfonso Cano, Georgios B. Gian...
In this paper, we propose a Boosted Interactively Distributed Particle Filter (BIDPF) to address the problem of automatic multi-object tracking in the application of player tracki...