We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Abstract-- This paper presents novel results on Perfect Reconstruction Feedback Quantizers (PRFQs), i.e., noise-shaping, predictive and sigma-delta A/D converters whose signal tran...
Milan S. Derpich, Eduardo I. Silva, Daniel E. Quev...
—Owing to the availability of low-cost and low-power CMOS cameras, Wireless Video Sensor Networks (WVSN) has recently become a reality. However video encoding is still a costly p...
Although gesture recognition has been studied extensively, communicative, affective, and biometrical “utility” of natural gesticulation remains relatively unexplored. One of t...
Songbirds have been widely used as a model for studying neuronal circuits that relate to vocal learning and production. An important component of this research relies on quantitat...