In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks ...
Nathan S. Evans, Chris GauthierDickey, Christian G...
Enterprise Resource Planning (ERP) systems are large, complex integrated software applications that often take years to implement. This study examined a major determinant of succe...
Tony Coulson, Conrad Shayo, Lorne Olfman, C. E. Ta...
In this paper, a multi-view face pose classification method is introduced. Each face region is normalized by two eye-centers and mouth center, and then multi-class classifiers are...
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...