In this paper we investigate the performance of IEEE 802.11b ad hoc networks by means of an experimental study. This analysis reveals several aspects that are usually neglected in...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...
Growth in the IT outsourcing industry during the past ten years has been exceptional. In this study, we theorize about and analyze the growth patterns of IT outsourcing at the leve...
Kunsoo Han, Robert J. Kauffman, Arti Mann, Barrie ...
Physical human-robot interaction can be significantly improved when being aware about the role each partner takes in a joint manipulation task. This holds especially in computer ...
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
In this paper, we propose a new manifold representation capable of being applied for visual speech recognition. In this regard, the real time input video data is compressed using P...
Dahai Yu, Ovidiu Ghita, Alistair Sutherland, Paul ...