Search systems have for some time provided users with the ability to request documents similar to a given document. Interfaces provide this feature via a link or button for each d...
Abstract. We propose a framework for intrusion detection that is based on runtime monitoring of temporal logic specifications. We specify intrusion patterns as formulas in an expre...
Although monadic second-order logic (MSO) has been a foundation of XML queries, little work has attempted to take MSO formulae themselves as a programming construct. Indeed, MSO f...
Camera handoff is a crucial step to generate a continuously tracked and consistently labeled trajectory of the object of interest in multi-camera surveillance systems. Most existi...
Chung-Hao Chen, Yi Yao, David L. Page, Besma Roui-...
Abstract--In this paper, we investigate various channel estimators that exploit channel sparsity in the time and/or Doppler domain for a multicarrier underwater acoustic system. We...
Christian R. Berger, Shengli Zhou, James C. Preisi...