The current VoIP transfer methods using low bit rate codes such as G.723.1 and G.729 are still very inefficient due to its small payload size in comparison with its large overhead ...
Abstract: Nowadays for any kind of distributed and multi-level, i.e. complex information systems it is vitally important to represent its data resources in a homogenized form. This...
Dmytry V. Kuklenko, Rustam Gamzayev, V. Goloborodk...
Facial Motion Cloning (FMC) is the technique employed to transfer the motion of a virtual face (namely the source) to a mesh representing another face (the target), generally havi...
Marco Fratarcangeli, Marco Schaerf, Robert Forchhe...
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
— Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the...