In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. The architecture of anomaly-based IDS based on si...
Lukasz Saganowski, Michal Choras, Rafal Renk, Wito...
We propose a region-of-interest (ROI) coding framework based on leaky prediction (LP) for robustly transporting H.264 video over error-prone network. The LP-based ROI coding can r...
This paper explores a distributed ontology framework for tailoring ontologies in the Semantic Grid environment. The framework is divided into five main categories; Ontology Proce...
Andrew Flahive, J. Wenny Rahayu, David Taniar, Ber...
Wireless Sensor and Actor Networks (WSANs) are composed of a large number of heterogeneous nodes called sensors and actors. The collaborative operation of sensors enables the dist...
Tommaso Melodia, Dario Pompili, Vehbi C. Gungor, I...
The competition among wireless data service providers brings in an option for the customers to switch their providers, due to unsatisfactory service or otherwise. However, the exi...
Haitao Lin, Mainak Chatterjee, Sajal K. Das, Kalya...