Face segmentation has been used in many different applications, such as face tracking, video surveillance in security control system and human computer interface. In this paper we...
Rudy Adipranata, Eddy, Cherry G. Ballangan, Ronald...
— In this paper, we present the architectural design of optical burst-buffers that can truly emulate input queuing and accommodate asynchronous burst operation. The architectural...
Konstantinos Yiannopoulos, Emmanouel A. Varvarigos...
— Traditional multiple-antenna detectors – which search a tree or a lattice structure – typically apply a metric that requires a preprocessing. Contrary to that, we present a...
– It is well known that IEEE 802.11 WLAN is highly inefficient for transporting voice data. For example, if one simply takes the data rate of 802.11b, 11Mbps, and divide it by tw...
— In this paper we propose and analyze a generalized multiple-tree-based overlay architecture for peer-to-peer live streaming that employs multipath transmission and forward erro...