The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
In this paper, the case of a cardboard box marketing firm is studied and a (R,s,Q,c) inventory replenishment policy is proposed and evaluated by means of discrete event simulation...
Carlos B. Ramirez Cerda, Armando J. Espinosa de lo...
We treat the problem of edge detection as one of statistical inference. Local edge cues, implemented by filters, provide information about the likely positions of edges which can ...
Scott Konishi, Alan L. Yuille, James M. Coughlan, ...
Argues that metrics can be generated from search transactional Web logs that can help evaluate search engine effectiveness. Search logs from the BBC Website were analysed and metr...
Paul Huntington, David Nicholas, Hamid R. Jamali M...
Abstract—Autonomous robot navigation in unstructured outdoor environments is a challenging area of active research. The navigation task requires identifying safe, traversable pat...
Michael J. Procopio, Jane Mulligan, Gregory Z. Gru...