Hidden Markov models assume that observations in time series data stem from some hidden process that can be compactly represented as a Markov chain. We generalize this model by as...
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
We study the application of Unequal Loss Protection (ULP) algorithms to motion-compensated video over lossy packet networks. In particular, we focus on streaming video applications...
Justin Goshi, Richard E. Ladner, Eve A. Riskin, Al...
—In this paper, we study the joint power and channel resource allocation problem for a multiuser F/TDMA decodeand-forward (DF) relay network under per-node power constraints and ...
Yin Sun, Yuanzhang Xiao, Ming Zhao 0001, Xiaofeng ...
This paper presents the application of cognitive algorithm for a stream diffusion in home theatre “5+1 audio” surround applications. We develop a wavelet-based method to effic...