— The quality of end-to-end services over wireless communication networks highly depends on the error characteristics of the wireless links. By utilizing the link error character...
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...
— TCP-Friendly Rate Control (TFRC) is being adopted in Internet standards for congestion control of various streaming media applications. In this paper, we consider the transmiss...
In this paper we develop a system for human behaviour recognition in video sequences. Human behaviour is modelled as a stochastic sequence of actions. Actions are described by a f...