An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
The problem of detecting multi-hop information flows subject to communication constraints is considered. In a distributed detection scheme, eavesdroppers are deployed near nodes in...
—Many sensor networks are deployed for the purpose of covering and monitoring a particular region, and detecting the object of interest in the region. In this paper, based on the...
Automatic localization of singular points in fingerprints is of critical importance in many algorithms. Existing methods of detecting singular points often require tedious ad-hoc ...
Determining the number of sources from observed dataisafundamentalprobleminmanyscientificfields.Inthispaper we consider the nonparametric setting, and focus on the detection perfor...