1,543 research outputs found
Another Casualty of the War . . . Vagrancy Laws Target the Fourth Amendment
This Comment will review the origins of the vagrancy law and its traditional abuses. It will then examine decisions discussing the vagrancy law\u27s constitutionality under the Due Process clause void-for-vagueness doctrine and the courts\u27 attempted remedy of explicit standards as to place, scope, or purpose. The remainder of this Comment will discuss the constitutionality of these revised vagrancy laws under the Fourth Amendment\u27s prohibition of unreasonable seizures
Consequences of Compliance and Deterrence Models of Law Enforcement for the Exercise of Police Discretion
The Internet is suffering from ossification. There has been substantial research on improving current protocols, but the vendors are reluctant to deploy new ones. We believe that this is in part due to the difficulty of evaluating protocols under realistic conditions. Recent wide-area testbeds can help alleviate this problem, but they require substantial resources (equipment, bandwidth) from each participant, and they have difficulty in providing repeatability and full control over the experiments. Existing in-house networking testbeds are capable of running controlled, repeatable experiments, but are typically small-scale (due to various overheads), limited in features, or expensive. The premise of our work is that it is possible to leverage the recent increases in computational power to improve the researchers' ability to experiment with new protocols in lab settings. We propose a cost-effective testbed, called MX, which emulates many programmable routers running over a realistic topology on multi-core commodity servers. We leverage open source implementations of programmable routers, such as Click, and modify them to allow coexistence of multiple instances in the same kernel in an effort to reduce packet forwarding overheads. Our initial results show that we outperform similar cost-effective solutions by a factor of 2. Next, we demonstrate that grouping and placing routers on to cores which share the L2 cache yields high performance.QC 20140707</p
Recommended from our members
Robust abandoned object detection integrating wide area visual surveillance and social context
This paper presents a video surveillance framework that robustly and efficiently detects abandoned objects in surveillance scenes. The framework is based on a novel threat assessment algorithm which combines the concept of ownership with automatic understanding of social relations in order to infer abandonment of objects. Implementation is achieved through development of a logic-based inference engine based on Prolog. Threat detection performance is conducted by testing against a range of datasets describing realistic situations and demonstrates a reduction in the number of false alarms generated. The proposed system represents the approach employed in the EU SUBITO project (Surveillance of Unattended Baggage and the Identification and Tracking of the Owner)
The Prostitution of Women and Girls In Metropolitan Chicago: A Preliminary Prevalence Report
This report represents the first ever research to determine the number of girls and women involved in prostitution in the Chicago metropolitan area. It marks the first phase of a project designed to ascertain how many of these girls and women are being affected by problems of violence, abuse, substance abuse, and homelessness in an effort to better help them escape from prostitution and rebuild their lives. Between July 2000 and March 2001 the Center for Impact Research (CIR) collected arrest statistics, conducted interviews with 124 social service providers in a range of fields, and investigated Internet and print source materials advertising prostitution services and online communication of men who solicit women and girls for prostitution to determine area
Drive in Peace
In this paper, in order to implement a computer vision-based recognition system of driving fatigue. In addition to detecting human face in different light sources and the background conditions, and tracking eyes state combined with fuzzy logic to determine whether the driver of the physiological phenomenon of fatigue from face of detection. Driving fatigue recognition has been valued highly in recent years by many scholars and used extensively in various fields, for example, driver activity tracking, driver visual attention monitoring, and in-car camera systems.In this paper, we use the Windows operating system as the development environment, and utilize PC as the hardware platform. First, the system uses a camera to obtain the frame with a human face to detect, and then uses the frame to set the appropriate skin color scope to find face. Next, we find and mark out the eyes and the lips from the selected face area. Finally, we combine the image processing of eyes features with fuzzy logic to determine the driver's fatigue level, and make the graphical man-machine interface with MiniGUI for users to operate.Along with that we are using Arduino Uno microcontroller which is connected to MQ2-smoke sensor through which we can detect smoke which appears through issue in the car system. The results of experiment show that we achieve this system on PC platform successfully
- …