This paper introduces a Self-Similarity Matrix (SSM) based video copy detection scheme and a Visual Character-String (VCS) descriptor for SSM matching. SSM, which exploits the spa...
Abstract. In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes i...
Alexandros G. Fragkiadakis, Vasilios A. Siris, Nik...
Audio watermarking has become an important technology for recording and advertisement industry. Today’s embedding and detection strategies often rely on digital or at least high...
Martin Steinebach, Andreas Lang, Jana Dittmann, Ch...
The advance of Internet technology fosters the order fulfillment process in a supply chain across heterogeneous information systems. In order to monitor states between partners in...
A silicon independent C-Based model of the TTP/C protocol was implemented within the EU-founded project FIT. The C-based model is integrated in the C-Sim simulation environment. T...
Astrit Ademaj, Petr Grillinger, Pavel Herout, Jan ...