In this paper, we investigate the e ectiveness of applying type-II hybrid ARQ schemes to the transmission of MPEG-2 encoded video streams over xed wireless links in broadband xed ...
Abstract-- This paper evaluates the performance of a distributed and lightweight AC model based on per-class edge-toedge monitoring feedback for ensuring the quality of multiple se...
The problem of establishing the identity of a speaker from a given utterance has been conventionally addressed using techniques such as Gaussian Mixture Models (GMM's) that m...
Richard C. Price, Jonathan P. Willmore, William J....
A formal approach for characterizing, evaluating and modeling packet reordering is presented. Reordering is, a phenomenon that is likely to become increasingly common on Internet,...
Nischal M. Piratla, Anura P. Jayasumana, Tarun Ban...
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...