Abstract. Peer-to-peer networks have often been touted as the ultimate solution to scalability. Although cooperative techniques have been initially used almost exclusively for cont...
In order to execute a program on a remote computer, it must first be transferred over a network. This transmission incurs the overhead of network latency before execution can beg...
Chandra Krintz, Brad Calder, Han Bok Lee, Benjamin...
—In this paper we present the computer vision component of a 6DOF pose estimation algorithm to be used by an underwater robot. Our goal is to evaluate which feature trackers enab...
Florian Shkurti, Ioannis M. Rekleitis, Gregory Dud...
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
End-to-end packet-pair probing has been used as one of the primary mechanisms to measure bottleneck capacity, crosstraffic intensity, and available bandwidth of end-to-end Internet...
Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Logu...