: Proactive computing reinforces the need for non-command interfaces that fulfill the user’s intentions without explicit commands. Eye gaze is a natural modality to be used in th...
Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and inef...
We introduce models for cooperative mitigating response strategies to suppress large scale Internet worm attack. In our models, cooperating members communicate with others using a...
The pupil-measuring capability of video eye trackers can detect the task-evoked pupillary response: subtle changes in pupil size which indicate cognitive load. We performed severa...
A robust method of camera response function estimation, using pictures taken by differently illuminating the same subject matter, is presented. The method solves for the response ...