The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
—In this paper, we propose new “low-overhead” network monitoring techniques to detect violations of path-level QoS guarantees like end-to-end delay, loss, etc. Unlike existin...
K. V. M. Naidu, Debmalya Panigrahi, Rajeev Rastogi
— The synchronization of image sequences acquired by robots swarms is an essential task for localization operations. We address this problem by considering the swarms as dynamic ...
The recent revolution of digital camera technology has resulted in much larger collections of images. Image browsing techniques thus become increasingly important for overview and...
In modern multimedia databases, objects can be represented by a large variety of feature representations. In order to employ all available information in a best possible way, a joi...
Hans-Peter Kriegel, Peter Kunath, Alexey Pryakhin,...