Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly d...
Most location sharing applications display people's locations on a map. However, people use a rich variety of terms to refer to their locations, such as "home," &qu...
Jialiu Lin, Guang Xiang, Jason I. Hong, Norman M. ...
Network virtualization has emerged as a powerful technique to deploy novel services and experimental protocols over shared network infrastructures. Although recent research has hi...
Location-based services have attracted the attention of important research in the field of mobile computing. Specifically, different mechanisms have been proposed to process loc...
Networks on chip (NoCs) draw on concepts inherited from distributed systems and computer networks subject areas to interconnect IP cores in a structured and scalable way. Congesti...