This paper describes work towards designing a computer vision system for helping users look up the meaning of a sign. Sign lookup is treated as a video database retrieval problem....
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
We present a method for fine grain QoS control of multimedia applications. This method takes as input an application software composed of actions. The execution times are unknown...
Distributed mechanisms that regulate the behavior of autonomous agents in open multi-agent systems (MAS) are of high interest since we cannot employ centralized approaches relying...
In recent years, the peer-to-peer paradigm has gained momentum in several application areas: file-sharing and VoIP applications have been able to attract millions of end users, w...