There are activities aiming at abling users to dock to a wireless or wired network while visiting organisations outside the premises of their usual connection to the network. Thes...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
In this paper, a robust technique is proposed to detect and track a set of twenty-eight prominent facial features under various facial expressions and face orientations in real-ti...
Abstract. This paper presents and investigates a set of local spacetime descriptors for representing and recognizing motion patterns in video. Following the idea of local features ...
— We investigate the problem of inferring the packet loss characteristics of Internet links using server-based measurements. Unlike much of existing work on network tomography th...