Learn More
In this paper we are concerned with event-based situation analysis. Application areas include the understanding and awareness of complex unfolding scenarios such as homeland security threats and future battlespace engagements. The paper (i) discusses the differences between the environments/requirements for event-based management and situation management,(More)
HyTime engine named HyOctane for access to and presentation of document instances. We have created a HyTime-conforming document type definition (HDTD) for encoding interactive multimedia presentations. Our system parses document instances encoded using our HDTD and stores the document descriptions in the database for presentation by our application. The(More)
Online is checked for eligibility for copyright before being made available in the live archive. URLs from City Research Online may be freely distributed and linked to from other web pages. Enquiries If you have any enquiries about any aspect of City Research Online, or if you wish to make contact with the author(s) of this paper, please email the team at(More)
Native multicast deployment is relatively slow and linked with a number of issues. However, there are a number of native multicast regions. Application Layer Multicast (ALM) can be used in areas of the network where there is no native multicast available. The SAM (Scalable Adaptive Multicast) Research group within the IRTF is investigating hybrid approaches(More)
HyTime provides a comprehensive set of primitives for composing hypermedia documents, but does not provide facilities for representing interaction or dynamic behavior, areas which are required in commercial multimedia authoring environments. In previous work we have developed and implemented a prototype HyTime engine called HyOctane in which HyTime(More)
NOTICE: this is the author's version of a work that was accepted for publication in Computer Communications. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was(More)
Previous work in automating insider threat detection has included top-down analysis and fusion of events from network and system monitors. Situation-awareness can extend the capability of such techniques to include observables outside of cyber-space. The application of situation-management to insider threats is becoming more practical due to the growing(More)