An operating system’s readahead and buffer-cache behaviors can significantly impact application performance; most often these better performance, but occasionally they worsen it...
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
In network performance tomography, characteristics of the network interior are inferred by correlating end-to-end measurements. In much previous work, the presence of correlations...
— This paper presents the localization of a mobile robot while simultaneously mapping the position of the nodes of a Wireless Sensor Network using only range measurements. The ro...
Emanuele Menegatti, Andrea Zanella, Stefano Zilli,...
Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations ...