— The mobile communication systems today, have different radio spectrum, radio access technologies, and protocol stacks depending on the network being utilized. This gives rise t...
—In this paper, we present a distributed algorithm to dynamically allocate the available resources of a service-oriented network to delay sensitive network services. We use a uti...
Michael G. Kallitsis, Robert D. Callaway, Michael ...
In this paper a new class of invertible watermarking approach based on quantization has been introduced. Based on the necessary conditions (blindness, reversibility and impercepti...
Mohammad Javad Saberian, Mohammad Ali Akhaee, Faro...
Component forensics is an emerging methodology for forensic analysis that aims at estimating the algorithms and parameters in each component of a digital device. This paper propos...
Speaker identification systems work quite well in controlled environments but their performance degrades severely in the presence of the reverberation that is frequently encounte...