Mobile devices are still memory-constrained when compared to desktop and laptop computers. Thus, in some circumstances, even while occupied by useful objects, some memory must be ...
Free-riders and fake files are two important problems in P2P file sharing systems. Previous works have always used incentive mechanisms and trust mechanisms to address them resp...
In this paper we propose the integration of Data Mining with Hidden Markov Models when applied to the problem of acoustic bird species recognition. We first show how each of them...
Erika Vilches, Ivan A. Escobar, Edgar E. Vallejo, ...
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste netw...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
— Window growth function for congestion control is a strong determinant of protocol behaviors, especially its second and higher-order behaviors associated with the distribution o...
Han Cai, Do Young Eun, Sangtae Ha, Injong Rhee, Li...