Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist rese...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
Though Twitter acts as a realtime news source with people acting as sensors and sending event updates from all over the world, rumors spread via Twitter have been noted to cause c...
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
This paper describes a publicly available database of subjective scores, relative to quality assessment of 156 video streams encoded with H.264/AVC and corrupted by simulating pac...
Francesca De Simone, Marco Tagliasacchi, Matteo Na...
In this paper, a non-linear relevance feedback mechanism is proposed for increasing the performance and the reliability of content-based retrieval systems. In particular, the huma...
Nikolaos D. Doulamis, Anastasios D. Doulamis, Stef...