This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...
Out-of-vocabulary (OOV) words represent an important source of error in large vocabulary continuous speech recognition (LVCSR) systems. These words cause recognition failures, whi...
Carolina Parada, Mark Dredze, Denis Filimonov, Fre...
With the ever-increasing demands on server applications, many new server services are distributed in nature. We evaluated one hundred deployed systems and found that over a one-yea...
Abdur Chowdhury, Ophir Frieder, Paul Luse, Peng-Ju...
1 In this paper we address the problem of selecting probe station locations from where probes can be sent to monitor all the nodes in the network. Probe station placement involves...
—Many applications require communication services with guaranteed timeliness and fault tolerance at an acceptable level of overhead. We present a scheme for restoring real-time c...