While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
In this paper, we present a tracking initialization method that combines a rough extraction of moving objects and a refined segmentation of their contours. The extraction of movin...
This paper presents an analysis of target localization accuracy, attainable by the use of multiple-input multiple-output (MIMO) radar systems, configured with multiple transmit and...
Hana Godrich, Alexander M. Haimovich, Rick S. Blum
A visual system not only needs to recognize a stimulus, it also needs to find the location of the stimulus. In this paper, we present a neural network model that is able to genera...
Gwendid T. van der Voort van der Kleij, Frank van ...
Switch-based interconnects are used in a number of application domains including parallel system interconnects, local area networks, and wide area networks. However, very few swit...
Rajeev Sivaram, Craig B. Stunkel, Dhabaleswar K. P...