Hough voting methods efficiently handle the high complexity of multiscale,
category-level object detection in cluttered scenes. The primary weakness
of this approach is however t...
Pradeep Yarlagadda, Antonio Monroy and Bjorn Ommer
Technology is advancing at a rapid pace, automating many everyday chores in the process, changing the way we perform work and providing various forms of entertainment. Makers of t...
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an ini...
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei We...
— In this paper, we extend the analytical model for the TCP steady state throughput as a function of the network utilization factor, round trip time and packet drop rate for unli...
Previously, we have analyzed the short-term fairness of the 802.11 DCF (Distributed Coordination Function) access method in the case of a network with two hosts. In this paper we e...
Gilles Berger-Sabbatel, Andrzej Duda, Martin Heuss...