Due to the lack of stability and reliability in peer-to-peer networks, multimedia streaming over peer-to-peer networks represents several fundamental engineering challenges. First...
We consider binary fingerprinting codes that trace at least one of t pirates using the marking assumption. Ensembles of binary equal-weight codes are considered along with a new e...
In this paper, we extend our proposed FGA-FEC coding scheme, a generalized MD-FEC method, to wireless networks. To protect the encoded scalable video bitstream over a lossy channe...
Yufeng Shan, John W. Woods, Shivkumar Kalyanaraman
A quantitative approach for measuring and describing feature interactions in object-oriented software components based on source code inspection is presented. The methodical arsen...
: In this paper, a hash function construction method based on cell neural network (CNN) with hyper-chaos characteristics is proposed. The chaos sequence is generated by iterating C...