We present in this paper an analytical model that accounts for the positions of stations with respect to the Access Point (AP) while evaluating the performance of 802.11 MAC layer...
Mohammad Hossein Manshaei, Gion Reto Cantieni, Cha...
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
We use the color cooccurrence histogram (CH) for recognizing objects in images. The color CH keeps track of the number of pairs of certain colored pixels that occur at certain sep...
We propose a new two-stage framework for joint analysis of head gesture and speech prosody patterns of a speaker toward automatic realistic synthesis of head gestures from speech p...
Background: Copy number data are routinely being extracted from genome-wide association study chips using a variety of software. We empirically evaluated and compared four freely-...
Jeanette E. Eckel-Passow, Elizabeth J. Atkinson, S...