Semantic Scholar uses AI to extract papers important to this topic.
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal… Expand The aim of the present study was to validate a modified version of the Categories of Auditory Performance (CAP) rating scale, the… Expand SoilEngineering is a user-friendly, interactive Microsoft Excel spreadsheet program for the geotechnical and geophysical analysis… Expand Media stream quality is highly dependent on underlying network conditions, but identifying scalable, unambiguous metrics to… Expand This paper presents a cost comparison of two video transport methodologies on a passive optical network (PON): an out-of-band… Expand This paper describes the process and particular support tools for authoring reusable web-based multimedia presentations. These… Expand Communication-based power management (CBPM) is a new battery-driven system-level power management methodology in which the system… Expand To provide a secure traversal service, firewalls need more than static packet filtering and application-level proxies. SOCKS… Expand We describe the design, implementation and operation of a prototype system which seamlessly mixes real-time audio and video… Expand A jack is provided which derives lifting power from vehicle motion. The lifting action of the main upright leg is regulated and… Expand