Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Abstract— Peer-to-Peer (P2P) systems provide decentralization, self-organization, scalability and failure-resilience, but suffer from high worst-case latencies. Researchers have ...
- In this paper we study efficient triangular grid-based sensor deployment planning for coverage when sensor placements are perturbed by random errors around their corresponding gr...
In this paper, we address one of the Wireless Sensor Network (WSN) management problems – optimization on the execution of multiple commands. The objective of the paper is to pro...
In this paper we present a novel tag removal method for tagged cardiac MR images. This method is based on a 2D bandstop filtering technique, which selectively attenuates the tag ...
Zhen Qian, Rui Huang, Dimitris N. Metaxas, Leon Ax...