Learn More
— The Distributed Denial of Services (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge, or spoof, the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial burden on the destination network for policing(More)
Online determination of track loss in the absence of ground truth is an important and challenging problem in visual tracking systems. In this paper, we construct a novel track loss determination strategy using Template Inverse Matching (TIM). The idea of TIM is to inverse the common process of template tracking match. Ground truth is not required to be(More)
  • X. Yuan, Z. Duan
  • 2005
In this paper, we propose an O(1) complexity round robin scheduler, called fair round robin (FRR), that provides good fairness and delay properties. Unlike existing O(1) complexity round robin schedulers that can only achieve long term fairness, FRR not only provides proportional fairness, but also maintains a constant normalized worst-case fair index as(More)
A web-based version of the RLIMS-P literature mining system was developed for online mining of protein phosphorylation information from MEDLINE abstracts. The online tool presents extracted phosphorylation objects (phosphorylated proteins, phosphorylation sites and protein kinases) in summary tables and full reports with evidence-tagged abstracts. The tool(More)
Induction motors are the most widely used electrical machines in industry. To diagnose any possible incipient faults, many techniques have been developed. Motor current signature analysis (MCSA) is a common practice in industry to find motor faults. However, because small modulations due to faults it is difficult to quantify it in the measured signals which(More)
The importance of capacity expansion decisions to lift constraints in parts of supply chains has increased significantly in recent years due to general ever-increasing performance requirements. Within a supply chain, insufficient capacity gradually leads to deteriorating delivery performance, and as a consequence, lowers revenue and market share. However,(More)
This paper presents a hybrid teaching approach, a new Web Security course as well as how to use the hybrid approach to teach the Web Security course to practice information assurance. The hybrid teaching approach contains three key issues that are keeping the lecture materials up-to-date, assigning former research projects as comprehensive team projects,(More)
A web-based version of the RLIMS-P literature mining system was developed for online mining of protein phosphorylation information from MEDLINE abstracts. The online tool presents extracted phosphorylation objects (phosphorylated proteins, phosphorylation sites, and protein kinases) in summary tables and full reports with evidence-tagged abstracts. The tool(More)