— By monitoring the exchanged IPsec traffic an adversary can usually easily discover the layout of virtual private networks (VPNs). Of even worse extend is the disclosure if com...
Michael Brinkmeier, Michael Rossberg, Guenter Scha...
—In many applications and environments for mobile communication there is a need for reference free perceptual quality measurements. In this paper a method for prediction of a num...
— Due to relative motion between the transmitter and the receiver, the carrier of the received signal in digital burstmode transmission can be affected by Doppler distortion. Thi...
Abstract— This paper considers an orthogonal amplify-andforward (OAF) protocol for cooperative relay communication over Rayleigh-fading channels in which the intermediate relays ...
This paper presents a multiple-agent architecture created in Max/ MSP that generates polyphonic rhythmic patterns which continuously evolve and develop in a musically intelligent m...