Abstract. In this conceptual paper, we report on studies and initial definitions of an immune-inspired approach to temporal anomaly detection problems, where there is a strict temp...
Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M....
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Abstract--An iterative joint channel estimation, symbol detection, phase recovery and interference cancellation structure is proposed for asynchronous code-division multiple-access...
We present here a head-mounted gaze tracking system for the study of visual behavior in unconstrained environments. The system is designed both for adults and for infants as young...
Wearable technology is omnipresent to the user. Thus, it has the potential to be significantly disruptive to the user’s daily life. Context awareness and intuitive device interf...
Lucy E. Dunne, Sarah Brady, Richard Tynan, Kim Lau...