This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Current visualization methods of volume angiograms are limited in their ability to display vessel connectivity and depth information readily available in the data set. In this wor...
ln thippaper,weinvestigatethetra"ion ofH.263 video sequencesoverwireIessnetworkswith errorrecoveryprovided by a twostep adaptivehybrid ARQ schemeusingRS codes. Each videoframe...
New non-desktop technologies may turn out to be of a more open and generic nature than traditional information technologies. These technologies consequently pose novel challenges ...
Mapping brain activity patterns in external actions has been studied in recent decades and is the base of a brain-computer interface. This type of interface is extremely useful for...
Alexandre Ormiga G. Barbosa, David Ronald A. Diaz,...