Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
This paper describes a method for the real-time measurement of vehicle queue parameters in a video-based traffic monitoring experimental system. The method proposed here is based ...
Michele Zanin, Stefano Messelodi, Carla Maria Mode...
In this paper, we present a network service specifically designed for multimedia servers. It uses a histogram based traffic characterization and an overload control protocol to el...
In both, metropolitan optical networks (MON) and long haul optical networks (LHON) the signal quality is often influenced by the physical impairments, therefore a proper impairment...