The Internet and the devices that connect to it consume a growing and significant amount of electricity. The utilization of desktop to switch Ethernet links is generally very low ...
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
In this paper we introduce a new task model that is specifically targeted towards representing stream processing applications. Examples of such applications are those involved in...
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
In this paper, we propose a speech-adaptive layered-coding (LC) scheme for the loss concealments of real-time CELPcoded speech transmitted over IP networks. Based on the ITU G.729...