Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
—It is well known that a packet loss in 802.11 can happen either due to collision or an insufficiently strong signal. However, discerning the exact cause of a packet loss, once ...
Shravan K. Rayanchu, Arunesh Mishra, Dheeraj Agraw...
—an interplay between mobile devices and static sensor nodes is envisioned in the near future. This will enable a heterogeneous design space that can offset the stringent resourc...
Current surveillance systems use multiple sensors and media processing techniques in order to record/detect information of interest in terms of events. Assessing the quality of in...
M. Anwar Hossain, Pradeep K. Atrey, Abdulmotaleb E...
Automatic speaker localization is an important task in several applications such as acoustic scene analysis, hands-free videoconferencing orspeechenhancement.Trackingspeakersinmult...
Carlos Segura, Alberto Abad, Javier Hernando, Clim...