— The anomaly-based intrusion detection systems examine current system activity do find deviations from normal system activity. The present paper proposes a method for normal act...
Recent advance in scalable video coding (SVC) makes it possible for users to receive the same video with different qualities. To adopt SVC in P2P streaming, two key design questio...
This paper present details of an integrated database visualization system. The system supports the visualization process from an end-to-end perspective. Included in the system is ...
This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges ...
Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amg...
The relation between the master equation and the Wigner function to characterize the dissipative system dynamics (evolution, mixedness and decoherence) between a three-level quant...
Juan P. Restrepo, Herbert Vinck-Posada, Boris A. R...