—Layered architectures are not sufficiently flexible to cope with the dynamics of wireless-dominated next generation communications. Cross-layer approaches may provide a better s...
Mohammad Abdur Razzaque, Simon Dobson, Paddy Nixon
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
This paper proposes a method for the multi-pitch estimation of polyphonic music signals. Instead of on the frame level, the estimation is based on the Partial Event, which is deï¬...
Zhiyao Duan, Dan Zhang, Changshui Zhang, Zhenwei S...
Due to the increase in diversity of wireless devices, streaming media systems must be capable of serving multiple types of users. Scalable coding allows for adaptations without re...
Carri W. Chan, Nicholas Bambos, Susie Wee, John G....
In dynamic and uncertain e-commerce settings, the value of contracts can change after they have been entered into. Sometimes this can make the contract in question counterproducti...