This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
This paper addresses the point-wise estimation of differential properties of a smooth manifold S--a curve in the plane or a surface in 3D--assuming a point cloud sampled over S is...
We present a novel technique for generating animation of laughter for a character. Our approach utilizes an anatomically inspired, physics-based model of a human torso that includ...
Paul C. DiLorenzo, Victor B. Zordan, Benjamin L. S...
In the field of controlled release technology for pesticides or active ingredients (AI), models that can predict its delivery during application are important for purposes of desi...
Abstract. In a seminal paper, McMillan proposed a technique for constructing a finite complete prefix of the unfolding of bounded (i.e., finitestate) Petri nets, which can be used ...