: The exposed memory hierarchies employed in many network processors (NPs) are expensive in terms of meeting the worst-case processing requirement. Moreover, it is difficult to ef...
We have proposed a real-time multi-target tracking system by cooperative behaviors of Active Vision Agents (AVAs), where an AVA is a logical model of a networkconnected computer w...
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
In this paper, we propose a novel system, Video Booklet, which enables efficient and nature video browsing and searching. In the system, a set of selected thumbnails excerpted fro...