Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
In particle image velocimetry (PIV) a temporally separated image pair of a gas or liquid seeded with small particles is recorded and analysed in order to measure fluid flows therei...
Florian Becker, Bernhard Wieneke, Jing Yuan, Chris...
This paper provides a logical framework for negotiation between agents that are assumed to be rational, cooperative and truthful. We present a characterisation of the permissible ...
Thomas Andreas Meyer, Norman Y. Foo, Rex Kwok, Don...
Abstract. Domain adaptation is an important emerging topic in computer vision. In this paper, we present one of the first studies of domain shift in the context of object recogniti...
Kate Saenko, Brian Kulis, Mario Fritz, Trevor Darr...
The previous link adaptation algorithms on ofdm based systems use equal modulation order for all sub carrier index within a block. For multimedia transmission using ofdm as the mo...