Existing work on inference detection for database systems mainly employ functional dependencies in the database schema to detect inferences. It has been noticed that analyzing the...
Manyindustrial processes involve makingparts with an assemblyof machines, where each machinecarries out an operation on a part, and the finished product requires a wholeseries of ...
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
This paper addresses the application of active contours or snakes for location and tracking of facial features. Conventional snake approaches find the position of the snake by fin...
Smart antennas are expected to enhance scalability in ad hoc networks. This paper at first evaluates three directional MAC protocols, DMAC, MMAC and SWAMP as well as the omni-dir...