: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
The assessment of the changeability of software systems is of major concern for buyers of the large systems found in fast-moving domains such as telecommunications. One way of app...
M. Ajmal Chaumun, Hind Kabaili, Rudolf K. Keller, ...
—We present a generative model and inference algorithm for 3D nonrigid object tracking. The model, which we call G-flow, enables the joint inference of 3D position, orientation, ...
—Recently, there has been a proliferation of service-based systems, i.e. software systems that are composed of autonomous services, but can also use software code. In order to su...
In this paper, we present work from our ongoing project on vision-guided retrieval and insertion of ORUs. Guidance is to be provided through estimated relative poses between an OR...