—In professional tennis training matches, the coach needs to be able to view play from the most appropriate angle in order to monitor players activities. In this paper, we presen...
Richard Tynan, Anthony Schoofs, Conor Muldoon, Gre...
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
— User’s requirements have become a key factor for any Quality of Service (QoS) management model to succeed. The advent and rise of new broadband services and network architect...
Eva Ibarrola, Fidel Liberal, Ianire Taboada, Rodri...
We present a framework for audio background modeling of complex and unstructured audio environments. The determination of background audio is important for understanding and predi...
Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...