Forward Error Correction (FEC) techniques have been adopted to overcome packet losses and to improve the quality of video delivery. The efficiency of the FEC has been significantl...
Longzhe Han, Sungjun Park, Seung-Seok Kang, Hoh Pe...
Iris recognition is a biometric technique which uses unique iris patterns between the pupil and sclera. The advantage of iris recognition lies in high recognition accuracy; howeve...
There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model ...
Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young...
In this paper, we propose a cooperative multi-relay scheme for a secondary system to achieve spectrum access along with a primary system. In the primary network, a primary transmi...
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Data routing in wireless sensor networks must be energy-efficient because tiny sensor nodes have limited power. A cluster-based hierarchical routing is known to be more efficient ...
Video streaming service over wireless networks is a challenging task because of the changes in the wireless channel conditions that can occur due to interference, fading, and stat...
In peer-to-peer (P2P) on-demand streaming networks, the alleviation of server load depends on reciprocal stream sharing among peers. In general, on-demand video services enable cl...
To be reversible as a data hiding method, the original content and hidden message should be completely recovered. One important objective of this approach is to achieve high embed...
Hee Joon Hwang, Hyoung Joong Kim, Vasiliy Sachnev,...