Modern network intrusion detection systems need to perform regular expression matching at line rate in order to detect the occurrence of critical patterns in packet payloads. Whil...
—We consider an ad hoc network where frequency hopping (FH), convolutional coding and multiple antennas are employed in order to combat fading and multiple access (MA) interferen...
Kostas Stamatiou, John G. Proakis, James R. Zeidle...
Avatars are increasingly used to express our emotions in our online communications. Such avatars are used based on the assumption that avatar expressions are interpreted universall...
This paper presents a technique for decomposing an unseen 3D face under any facial expression into an estimated 3D neutral face and expression deformations (the shape residue betwe...
Faisal R. Al-Osaimi, Mohammed Bennamoun, Ajmal S. ...
Named entity recognition systems sometimes have difficulty when applied to data from domains that do not closely match the training data. We first use a simple rule-based techniqu...
Asad B. Sayeed, Timothy J. Meyer, Hieu C. Nguyen, ...