In this paper, dynamic rate shaping for H.264/AVC intracoded video streams is investigated. An analysis of the distortion distinguishes different error components that lead to the...
Stijn Notebaert, Jan De Cock, Kenneth Vermeirsch, ...
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
Constraint-Based Testing (CBT) is the process of generating test cases against a testing objective by using constraint solving techniques. In CBT, testing objectives are given und...
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Spatial data are particularly useful in mobile environments. However, due to the low bandwidth of most wireless networks, developing large spatial database applications becomes a c...