We present a family of methods for speeding up distributed locks by exploiting the uneven distribution of both temporal and spatial locality of access behaviour of many applicatio...
We consider packet scheduling in a network providing differentiated services, where each packet is assigned a value. We study various queueing models for supporting QoS (Quality ...
The exploitation of biometrics information in human shadow silhouettes (shadow biometrics), derived from video imagery after processing by gait analysis methods opens new avenues ...
The sound reaching the acoustic sensor in a realistic environment contains not only the part arriving directly from the sound source but also a number of environmental re ections....
Adam O'Donovan, Ramani Duraiswami, Dmitry N. Zotki...
Background: Human cancer is caused by the accumulation of tumor-specific mutations in oncogenes and tumor suppressors that confer a selective growth advantage to cells. As a conse...