This paper addresses the problem of fault resilience of overlay-based live media streaming from two aspects: (1) how to construct a stable multicast tree that minimizes the negati...
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
In video surveillance, automatic methods for scene understanding and activity modeling can exploit the high redundancy of object trajectories observed over a long period of time. ...
The question how to integrate information from different sources in speech decoding is still only partially solved (layered architecture versus integrated search). We investigate t...
— In this paper, we investigate the outage performance of cognitive wireless relay networks where source nodes communicate to their destinations via multiple hops facilitated by ...