With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Three-dimensional user interfaces (3D UIs) support user tasks in many non-traditional interactive systems such as virtual environments, augmented reality, and ubiquitous computing...
Doug A. Bowman, Jian Chen, Chadwick A. Wingrave, J...
We consider qualitative and quantitative verification problems for infinite-state Markov chains. We call a Markov chain decisive w.r.t. a given set of target states F if it almos...
Parosh Aziz Abdulla, Noomene Ben Henda, Richard Ma...
We consider the problem of fairly matching the left-hand vertices of a bipartite graph to the right-hand vertices. We refer to this problem as the optimal semimatching problem; it...
Nicholas J. A. Harvey, Richard E. Ladner, Lá...
Facial expression recognition is an active research area that finds a potential application in human emotion analysis. This work presents an illumination independent approach for...