A biometric-based method for multimedia content protection was recently proposed. The method relies on biometric data of the user and a layered encryption mechanism to achieve con...
Daniel Socek, Michal Sramka, Oge Marques, Dubravko...
This paper describes the experimental analysis of SCTP handover for the dual-homing and singlehoming mobile terminals based on Linux platform. From the experiments, it is shown th...
Dong Phil Kim, Jong-Shik Ha, Sang-Tae Kim, Seok Jo...
: The purpose of the current work is to explore and improve the analysis of event data stored in event repositories, enabling the application of specialized event algebra operators...
Abstract. Quality of neural network mappings may be evaluated by visual inspection of hidden and output node activities for the training dataset. This paper discusses how to visual...
We present a method that flattens a curved surface and its neighborhood to create effective, uncluttered visualizations by applying standard flow visualization techniques in the d...
Christoph Petz, Steffen Prohaska, Leonid Goubergri...