Learn More
Digital images and video are becoming an integral part of human communications. The ease of capturing and creating digital images has caused most on-line information sources look more " visual ". We use more and more visual content in expressing ideas, reporting, education, and entertainment. With the tremendous amount of visual information becoming(More)
Search engines are the most powerful resources for finding information on the rapidly expanding World Wide Web (WWW). Finding the desired search engines and learning how to use them, however, can be very time consuming. The integration of such search tools enables the users to access information across the world in a transparent and efficient manner. These(More)
A key goal of information analytics is to identify patterns of anomalous behavior. Such identification of anomalies is required in a variety of applications such as systems management, sensor networks, and security. However, most of the current state of the art on anomaly detection relies on using a predefined knowledge base. This knowledge base may consist(More)
Policy based systems management provides a means for administrators, end-users and application developers to manage and dynamically change the behavior of computing systems. One advantage of policy-based management is that it simplifies and automates the administration of IT environments. A significant part of the simplification is obtained by allowing the(More)
The Differentiated Services Architecture defines the mechanisms that are needed to offer multiple classes of services in an IP network. While this model offers significant scaling advantages over the signaling-oriented approach of Integrated Services, the management of a differentiated services network remains a complex problem. Since the operation of a(More)
The deployment of converged services of TV, telephony, and Internet access over IP entails a significant initial investment for service providers. This investment is not only for the underlying network infrastructure but also for provisioning and managing vast data centers needed to provide sophisticated IP-based TV (IPTV) experience, including multiple(More)
Policy-based file lifecycle management is important for balancing storage utilization and for regulatory conformance. It poses two important challenges, the need for simple yet effective policy design and an implementation that scales to billions of files. This paper describes the design and an innovative implementation technique of policy-based lifecycle(More)
We are investigating computing platform-independent policy frameworks to specify, analyze, and deploy security and networking policies. The goal is to provide easy to use mechanisms for refining high-level user-specified goals into low-level controls. This scenario-based demo of a Coalition Policy Management Portal prototype uses the context of a hostage(More)