This paper investigates the operations of the wavelet tree based quantization and proposes a constrained wavelet tree quantization for image watermarking. The wavelet coefficients ...
This paper addresses support for nzulti-party multimedia applications delivered across datagram wide-area networks such as the Internet. Our approach is to develop a novel retrans...
Matthew T. Lucas, Bert J. Dempsey, Alfred C. Weave...
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Understanding human-human interaction is fundamental to the long-term pursuit of powerful and natural multimodal interfaces. Nonverbal communication, including body posture, gestu...
Matthew Turk, Jeremy N. Bailenson, Andrew C. Beall...
We have taught several distributed software engineering project courses with students and real clients [4]. During these projects, students in Pittsburgh and Munich, Germany colla...
Andreas Braun, Allen H. Dutoit, Andreas Harrer, Be...