In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Inter-vehicle communication is becoming increasingly important in recent years. Traditional research efforts on vehicular networks have been put into safety or infotainment applica...
Howard CheHao Chang, Haining Du, Joey Anda, Chen-N...
This paper describes a model and a setup for emulating fractal and multifractal noise for the measurement and evaluation of performance of ZigBee mesh networks intended for harsh ...
Low-level image analysis systems typically detect "points of interest", i.e., areas of natural images that contain corners or edges. Most of the robust and computationall...
The image of a license plate is scanned by the camera attached to a mobile PDA device and the numbers on the plate are detected by the image processing parts in the proposed Mobile...
Jin-Suk Kang, Taikyeong T. Jeong, Sang Hyun Oh, Me...