Abstract—Existing approaches to P2P streaming can be divided into two general classes: (i) tree-based approaches use pushbased content delivery over multiple tree-shaped overlays...
Abstract. We consider the problem of learning an acyclic discrete circuit with n wires, fan-in bounded by k and alphabet size s using value injection queries. For the class of tran...
Dana Angluin, James Aspnes, Jiang Chen, Lev Reyzin
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
Abstract. Pronunciation by analogy (PbA) is a data-driven approach to phonetic transcription that generates pronunciations for unknown words by exploiting the phonological knowledg...
Tasanawan Soonklang, Robert I. Damper, Yannick Mar...
Abstract— This paper presents an analytical model for evaluating the capability of wireless LANs (WLANs) to provision quantitative quality of service (QoS) guarantees. We conside...
Yu Cheng, Lin Cai, Xinhua Ling, Wei Song, Weihua Z...