In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
—In large network environments multiple intrusion detection sensors are needed to adequately monitor network traffic. However, deploying and managing additional sensors on a lar...
Hao Chen, John A. Clark, Siraj A. Shaikh, Howard C...
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...
The large number of rear end collisions due to driver inattention has been identified as a major automotive safety issue. In this paper, we describe a 3-phase vehicle tracking met...
- This paper describes our design and implementations of projector-based computer augmented environment that allows users to interchange digital information between a computer and ...
Sang Heon Han, Jung Hoon Kim, Tae Soo Yun, Dong Ho...