—We consider a distributed multi-user system where individual entities possess observations or perceptions of one another, while the truth is only known to themselves and they mi...
—Access Control Lists (ACLs) are the core of many networking and security devices. As new threats and vulnerabilities emerge, ACLs on routers and firewalls are getting larger. T...
Counting the number of RFID tags, or RFID counting, is needed by a wide array of important wireless applications. Motivated by its paramount practical importance, researchers have...
—Live media streaming has become one of the most popular applications over the Internet. We have witnessed the successful deployment of commercial systems with CDN- or peerto-pee...
—Multi-path TCP (MP-TCP) has the potential to greatly improve application performance by using multiple paths transparently. We propose a fluid model for a large class of MP-TCP...
Qiuyu Peng, Anwar Walid, Jaehyun Hwang, Steven H. ...